Role of a professional working in a network security center


Today we see various proactive measures in use. For example, banks may use thick steel and concrete vaults with the latest electronic security system to prevent break-ins. While convenience stores may place cameras in visible sight to record business activities, as well as, deter possible theft.

Although I lack the experience in role of a professional working in a Network Security Center, I believe one of the goals or main goal for those security professionals is to prevent host based or network-based attacks that would compromise a system. One common example today for most companies is that they may own thousands of endpoints around the world that run multiple operating systems and applications from various vendors.

While assuming the task to make sure software on those endpoints are not susceptible to dangerous vulnerabilities from a missing patch update or user embedded, it is important that proactive measures are always set. From research on the current topic, Farhat et al (2011) recommends developing a compliance work plan.

The plan must include your cyber-attack procedures, in combination with other compliance matters such as policies, code of conduct, training, and specific incident response procedures.

In most companies, a majority of employees may not read the specific details for use of computers on the network when signing on to gain access.

In return, employees introduce worms or viruses that may cause damage to the system infrastructure when not knowing the appropriate network use. Vacca (2014) states that the fundamental goals of a security policy are: "to allow uninterrupted access to the network resources for authenticated users and to deny access to unauthorized users" (p. 263).

Farhat et al (2011) also recommends that companies should invest in security equipment and procedures to deter or prevent cyber-attacks. Those measures include applying the latest security patches, protecting all passwords, developing network security architecture, monitoring activities and procedures of third-party contractors (p. 3)

I think having effective patching processes in place, employee training on the network and use policy, and investing in your equipment are some of the ways to have proactive measures for your network.

The list doesn't stop there, but having plans such as a Cyber Incident Response, knowing cybercrime law, and mitigation against cyber-attacks go a long way. 2 Timothy 3:16-17 says, "All Scripture is breathed out by God and profitable for teaching, for reproof, for correction, and for training in righteousness, that the man of God may be competent, equipped for every good work." As security professionals, it may be a common theme to continually teach and learn so that they may uphold the posture of their company's network.

Through this training the professionals are given in their careers their goal is to perform good work.

References: Vaca, J. R. (2014). Network and System Security (2nd ed.) Waltham, MA: Syngress/Elsevier. ISBN:9780124166899.19. Farhat, V., McCarthy, B., Raysman, R., Holland & Knight LLP. (2011).

Cyber Attacks Prevention and Proactive Responses. Vince Farhat, Bridget McCarthy and Richard Raysman, Holland & Knight LLP

Article with reference in APA format.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Role of a professional working in a network security center
Reference No:- TGS02394051

Now Priced at $10 (50% Discount)

Recommended (99%)

Rated (4.3/5)