You're working as a security analyst for a small company that doesn't have the resources of larger organizations to secure it's network. What type of network security solution should you consider implementing? In your opinion which of the many services it offers provides the most benefits? How about the least?
Network security is anything you do to protect your network, both hardware and software. Network administrators (or system administrators) are responsible for making sure the usability, reliability, and integrity of your network remains intact. A hacker is capable of getting into a network and blocking your access, for example by holding a system hostage for a bitcoin ransom. You need an excellent defense in place to ensure you’re protected.
Detecting weaknesses in a network can be achieved through:
As a part of security engineering, there are proactive measures to predict where vulnerabilities might lie and reinforce them before they’re hacked:
Network admins are able to target threats (whether through suspicious activity or large queries to a database), then halt those attacks, whether they’re passive (port scanning) or active, like:
===========================================================================================
The Answer to your question:
methods of protecting networks include:
Within network security is also content security, which involves strategies to protect sensitive information on the network to avoid legal or confidentiality concerns, or to keep it from being stolen or reproduced illegally. Content security largely depends on what information your business deals in.
===============================================================================================
Most beneficial:
ENDPOINT SECURITY: SECURING THE WEAKEST LINK
It’s said that users are often the weakest link in the security chain, whether it’s because they’re not properly educated about phishing campaigns, mistakenly give credentials to unauthorized users, download malware (malicious software), or use weak passwords. That’s why endpoint security is so crucial—it protects you from the outside in.
Endpoint security technology is all about securing the data at the place where it both enters and leaves the network. It’s a device-level approach to network protection that requires any device remotely accessing a corporate network to be authorized, or it will be blocked from accessing the network. Whether it’s a smartphone, PC, a wireless point-of-sale, or a laptop, every device accessing the network is a potential entry point for an outside threat. Endpoint security sets policies to prevent attacks, and endpoint security software enforces these policies.
If you’ve ever accessed a network through a virtual private network (VPN), you’ve seen endpoint security in action. Malware is one of the core threats addressed by endpoint security, including remote access trojans (RATs), which can hack into a laptop and allow hackers to watch you through your webcam.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------
INTERNET SECURITY: GUARDING AGAINST CYBER CRIMES
The internet itself is considered an unsecured network—a scary truth when we realize it’s essentially the backbone for how we give and receive information. That’s where internet security (or cyber security) comes in, and it’s a term that can get pretty broad, as well. This branch of security is technically a part of computer security that deals specifically with the way information is sent and received in browsers. It’s also related to network security and how networks interact with web-based applications.
To protect us against unwittingly sharing our private information all over the web, there are different standards and protocols for how information is sent over the internet. There are ways to block intrusions with firewalls, anti-malware, and anti-spyware—anything designed to monitor incoming internet traffic for unwanted traffic or malware like spyware, adware, or Trojans. If these measures don’t stop hackers from getting through, encryption can make it harder for them to do much with your data by encoding it in a way that only authorized users can decrypt, whether that data is in transit between computers, browsers, and websites, or at rest on servers and databases.
To create secure communication channels, internet security pros can implement TCP/IP protocols (with cryptography measures woven in), and encryption protocols like a Secure Sockets Layer (SSL), or a Transport Layer Security (TLS).
Other things to have in an internet security arsenal include:
===============================================================================================
Least beneficial:
APPLICATION SECURITY: CODING APPS TO BE SAFE FROM THE GROUND UP
A lot of the internet security focus is on patching vulnerabilities in web browsers and operating systems, but don’t neglect application security—a majority of internet-based vulnerabilities come from applications. By coding applications to be more secure from the start, you’re adding a more granular layer of protection to your internet and network security efforts, and saving yourself a lot of time and money.
App security does rest on top of many of the types of security mentioned above, but it also stands on its own because it’s specifically concerned with eliminating gaps and vulnerabilities in software at the design, development, and deployment stages. Security testing(which should be conducted throughout the code’s lifecycle) digs through the app’s code for vulnerabilities, and can be automated during your software development cycle.
Choosing a language, framework, and platform with extra security fortifications built in is paramount, too. For example, Microsoft’s .NET framework has a lot of built-in security, and the Python Django-style Playdoh platform addresses application security risks. Rising in popularity is the Spring Security framework, a Java framework known for excellent built-in authentication and authorization measures, and the PHP framework Yii prioritizes security, as well.
Aside from framework choice, there are a few strategies to bolster application security, including:
You're working as a security analyst for a small company that doesn't have the resources of...
Suppose you have been hired to manage human resources for a small company that offers business services including customer service calls and business report preparation. The 20 person company has been preparing to expand from serving a few local clients that are well known to the company's owners. The owners believe that their experience and reputation for quality will help them expand to serve more and larger clients. What challenges will you need to prepare the company to meet? How...
As a new systems analyst, you suspect that testing web-based systems probably involves a different set of tools and techniques, compared to testing traditional LAN-based systems. Because you’ve always wanted to run your own IT company, you have decided to launch a start-up firm called WebTest, Inc., that would offer consulting services specifically aimed at testing the performance, integrity, efficiency, and security of Internet-based systems. Your idea is to identify and purchase various website testing tools that currently are available,...
Topic: Cloud-Based Organizations Overview: Your company is interested in learning more about cloud computing and the varying services offered. Your organization wants to start small by transitioning from Exchange to a cloud-based corporate email and calendar application with a service provider that can eventually support all other internal productivity programs. The head of the IT department has handed you a list of cloud-based organizations because he doesn’t have time to put together a report for the CEO that explains what...
Case 1 1. If Ben continued working until he turned 64, would he be able to claim Social Security `benefits, and if so, what percentage of his full benefit would he receive? 2. If Ben was in an accident and passed away before retiring, would his wife receive any Social Security benefits? Why or why not? 3. Ben is enrolled in a defined benefit pension plan with his employer. How does this differ from a defined contribution program? Case 2...
QUESTION 1 (20) Systems development includes every resource and every step that goes into producing an information system that solves a problem or helps the organisation take advantage of new opportunities. CyberTech has appointed you to head their software development project. Your task is to create a report highlighting the phases of the software development process as an attempt to inform management of the activities involved in developing software. Your report should clearly explain the steps or phases in the...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...
Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...
Uncovering social service fraud saves millions, reinforces public trust Los Angeles County uses SAS® to detect fraud, resulting in fewer losses, lower investigative costs and greater confidence from citizens In Los Angeles County, the Department of Public Social Services (DPSS) offers a range of programs to alleviate hardship and promote health, personal responsibility and economic independence. Across the county's many communities, DPSS offers temporary financial assistance, employment services, free/low-cost health insurance, food benefits, in-home supportive services for the elderly and...