Describe multiple layers of security for differing system


Assignment:

All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight.

RESPONSE 1:

Security is impacted by many factors including what type of network or system is being used, what systems will be connected to it or in communication with it and how available it should be to users amongst others. For all types of networks, it is vital to use the principle of defense in depth to secure it on all levels of the TCP/IP structure, and also, using legal regulations to apply policies that meet the criteria that is expected in general and for the specific industry you work in. Defense in depth is meant as not a strict use of certain security features but rather a term used to describe multiple layers of security for differing aspects of a system. These controls all work together to provide added layers of security so if a threat bypasses one security control, hopefully another one will catch it. Some of the mainstay controls that can be used are POLP or principle of least privilege, firewalls, port filtering, Intrusion prevention system, anti-virus/anti-malware, physical precautions, training for staff and auditing. These are all various ways to implement security but by far a comprehensive list. Even within this listing, there are a great number of details and security options that can be implemented. Having a policy and framework that specifies the controls that are to be used, lays out the network schematic and has a detailed Disaster Recovery Plan included is essential as well. These documents will help to know how to handle any situation, however they must be revisited and updated frequently. Audits and risk assessments will help these to remain up to date if they are revisited and updated with those occur.

-AMANDA

Plus, P. C. (2009, September 12). How to secure your TCP/IP Ports. TechRadar.

Winterfeld, Steve, and Jason Andress. The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Elsevier Science & Technology Books, 2012.

RESPONSE 2:

Security architecture consists of tools, techniques, and technologies that detect and prevent network penetration additionally, practicing cybersecurity countermeasures ensures the network will be hardened. It is good to have a digital footprint of the organization to gather information about the different devices within the organization before performing a penetration (pen) test (Levy, 2021). It would be a good idea to start with what security tools are in place such as firewalls, intrusion detection systems (IDS) and other devices are operating. A network map can be created that can identify things like networks, remote sites, routers, servers, and other important devices (Helpsystems, 2017).

Some countermeasures to preventing attacks are to check for things like thing Open-Source intelligence (OSINT) this could be from the corporate website, online forums, social media, and other online outlets. If these sites are releasing too much general information about the organization it could lead to a social engineering attack (Bisson, 2021). Another countermeasure that not all organizations think to do is securing their trash. This is important because if sensitive data or important data and documents are found in the trash a hacker can use that information or exploit it.

Another countermeasure is securing the network because a hacker could be wardriving around to look for unsecured networks to penetrate (Panda, 2020). With technology on the rise now drones are being sent to look for weak networks so implementing security cameras that can identify drones is a good idea. Physical barriers should be in place as well such as locked doors that require a badge. Another option is having a security guard who requires everyone who walks through the door to present their photo badge. These things can help secure and prevent cybersecurity breaches.

-ROBERTO

Bisson, D. (2021, September 14). 10 open-source intelligence tools (that actually work with your existing security software).

Helpsystems. (2017, February 22). Network Mapping Best Practices: Four Steps for Success.

Levy, E. (2021, June 02). What is a digital footprint?

Panda. (2020, December 17). Wardriving: What is it + how can you detect it?

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Describe multiple layers of security for differing system
Reference No:- TGS03158977

Now Priced at $20 (50% Discount)

Recommended (95%)

Rated (4.7/5)