In: Computer Science
REGARDING RISK ASSESSMENT
What are the control measures currently in use to protect against network threats? What are the network-related vulnerabilities found by the risk assessment team?
PLEASE MAKE COPY PASTE AVAILABLE
MUST BE 250 WORDS
1. Bolster Access Control
Access control is an important part of security. Weak access control leaves your data and systems susceptible to unauthorized access.
Boost access control measures by using a strong password system. You should have a mix of uppercase and lower case letters, numbers, and special characters. Also, always reset all default passwords.
Finally, create a strong access control policy.
2. Keep All Software Updated
As pesky as those update alerts can be, they are vital to your network’s health.
From anti-virus software to computer operating systems, ensure your software is updated. When a new version of software is released, the version usually includes fixes for security vulnerabilities.
Manual software updates can be time-consuming. Use automatic software updates for as many programs as possible.
3. Standardize Software
Keep your systems protecting by standardizing software. Ensure that users cannot install software onto the system without approval.
Not knowing what software is on your network is a huge security vulnerability. Make sure that all computers use the same:
Operating system
Browser
Media player
Plugins
Standardization also makes system updates less of a hassle.
4. Use Network Protection Measures
Protecting your network is crucial. To keep your network and its traffic secured:
Install a firewall
Ensure proper access controls
Use IDS/IPS to track potential packet floods
Use network segmentation
Use a virtual private network (VPN)
Conduct proper maintenance
5. Employee Training
Sometimes external threats are successful because of an insider threat. The weakest link in data protection can be your own employees.
Ensure your employees understand network security. Your employees should be able to identify threats. They should also know who to contact to avoid a security breach.
Provide security training throughout the year, and be sure to update it.
There are new security risk every day.
Network vulnerabilities come in many forms but the most common types are: