In: Computer Science
There are a lot of strategies for setting up network defense systems. Physical restrictions can be put in place, such as separating hardware, or using switches and cabling to do so. One can also use virtualized segmentation in the form of VLANs, and virtual networks (including switches). What strategy do you feel is best suited to defend against modern cybersecurity threats? State your opinion concerning which technologies you would deploy if you were positioned to protect a university campus from cybersecurity threats. use any type of security, just need to know what is a strategy you would use that will defend against cybersecurity threats, and why? What is the best technology to use if I was to deploy one for a university?
Answer)
A cyber threat in cybersecurity is a possible danger scenario where
a vulnerability might be exploited and the security can be
breached. In today's internet-connected world, we are going through
the Internet-related activities every day and we are using the
Internet in many operations of day to day lives such as securing a
campus network. Thus for a company for which the security systems
and encryption systems were breached, we need to adopt a certain
number of steps to make the company information system secure
against similar outsider and insider threats. Thus Cybersecurity is
very important in the digital and connected world.
Cybersecurity was much less of a drama and requirement in the early
areas of the Internet when the Internet was major used by limited
people and much used in the research purposes in the 1980s and
1990s. But however the needs of today are different, in the ages of
cloud computing and IoT, and internet-enabled computers, mobile
phones, even TVs and household appliances are there. Thus
cybersecurity has to be taken more seriously than before.
There are many strategies which can be used to secure a university
campus from cybersecurity threats such as:
a) Installing and maintaining the firewall
b) Keeping the security patches and hotfixes updated
c) Installing and monitoring systems with virus and spyware
protection
d) Backing up the hard drives and other important data
e) Monitoring security bulletins to secure operating system and
applications
f) The closing of certain ports on the servers and computers
g) Using strong encryption policies
h) Using VLAN to segregate different departments and types of
users
The best technology among all these and most necessary should be
the firewall implementation and encryptions along with keeping the
security patches and hotfixes updated.