Question

In: Computer Science

Create a list of how organizations use common safeguards to protect other users on the network,...

Create a list of how organizations use common safeguards to protect other users on the network, such as firewalls, proxy servers, user names and passwords, access controls, and audit trails.

Solutions

Expert Solution

Building a Network Defense Mechanism

· Setting up well defined and secured Wireless Network

· Ensuring Strong Password practices or primarily using a password generator

· Managing roles and privileges

· Building Strong front line Firewall defense

· Involving an Intrusion Detection System

Installing Anti-Virus, Anti-Spyware and Anti-Malware solution

It is very critical to keep our systems safe from attacks like viruses, malwares and Spywares. For enabling this we need a very strong and updated database of Viruses, spywares and malwares globally affecting the system. Every day new viruses are released onto the open networks. These newly introduced viruses are strong as they are created taking into consideration the vulnerabilities of the security systems. Hence, it always required to keep a check on the activity or most specifically malicious activity performed by any unknown application or script and efficiently putting them in quarantine

Educating Users in terms of possible vulnerabilities

It is very critical for the users of the systems to understand the vulnerabilities of the network around them. There are multiple ways via which the users may fall prey to the attacks

· Dangerous Links

· Unsecured Sites

· Password Infringements

· Data Mishandling

· Email Phishing

Keeping all the Software’s up to date

The software makers always strive to ensure that their software’s are attack proof or of minimal vulnerabilities. Hence, to ensure that they release timely security patches to their customers. We should always check for any critical security updates available for legitimate and trusted software’s

Using only standardized and safe/recognized software’s

At times users may end up downloading misleading software’s that may have malicious intent behind its frontal working. One should ensure that they are using software’s which are marked as standardized by the organization. Make sure that all computers use the same:

· Operating System

· Browser Application

· Document / PDF application

· Plugins

Standardization assures less issues in terms of attack from unknown sources.

Implementing Duo/Multifactor Authentication

Having a Multifactor authentication adds up to the security of the credentials possessed by the individual. Encouraging the same enables a lot of safety from credential theft of the users.

Setting strict permissions for the Database systems

Setting up roles and restricting accesses as per the user responsibilities and allowing access of data only to the intended users.

Using proper SSLs, Digital signatures or certificates

SSLs, Digital Signatures, and digital certificates can be used whenever required to prove the authenticity of the user posing an entity on the internet

Regular Monitoring

For safeguarding the organizational infrastructure regular checks monitoring whether the standards are followed as per instructions and mock drills for cyber attacks are done by the IT Security Team

Constant Testing

Every system hosted on the portal should be tested for vulnerabilities as per the new upgrades in the overall system environment

Audit Trails

Audit trails maintain logs of system activity performed both by system and application processes and by the overall user activity on the systems and applications. In conjunction with tools and procedures, audit trails assist in identifying security infringements, performance issues, and defects in applications.

Access Control

Access Control is a mechanism that guarantees that the user who is asking for the access permissions is having those rights to access that particular data.

Proxy servers

The Proxy servers is basically a dummy or another computer system which serves as a hub through which internet request is processed. The computer sends your request to the server and then returns with the response. This mechanism avoids the direct exposure of the actual main system with the outside world


Related Solutions

You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  
What are the risks for nonprofits that use the copyrighted materials of other organizations? How would...
What are the risks for nonprofits that use the copyrighted materials of other organizations? How would you manage this risk?
It is very common that organizations use threat intelligence to _________________________________________. A. better know how threat...
It is very common that organizations use threat intelligence to _________________________________________. A. better know how threat actors carry out their attacks and to gain insights about the current threat landscape B. hire new employees for their cybersecurity teams C. maintain competitive advantage D. configure their antivirus to be less invasive
List and describe four common structural inhibitors of teamwork in organizations?
List and describe four common structural inhibitors of teamwork in organizations?
1. How to create a group of users using a PowerShell script. 2. how to create...
1. How to create a group of users using a PowerShell script. 2. how to create a file consisting a group of 3 new user name’s and passwords, 1 to a line in power shell. 3. How to write a script in power shell to delete specific group of users. Prove that it works.
REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against network threats?...
REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against network threats? What are the network-related vulnerabilities found by the risk assessment team? PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
How do corporations claim that they protect workers rights vs. how labor and environmental organizations and...
How do corporations claim that they protect workers rights vs. how labor and environmental organizations and government organizations organize labor claim they protect workers rights? Contrast their different Perspectives
How would you use SAS Enterprise Miner to create a neural network model of your example?
How would you use SAS Enterprise Miner to create a neural network model of your example?
Use a powershell script to bulk create 10 users (sales1, sales2, ...) inside OU=MyBusiness, OU=Users, OU=Sales,...
Use a powershell script to bulk create 10 users (sales1, sales2, ...) inside OU=MyBusiness, OU=Users, OU=Sales, save script to desktop
In Kali Linux, create two users Guest2 and Guest3. Use the user (for yourself in Question...
In Kali Linux, create two users Guest2 and Guest3. Use the user (for yourself in Question 1) to create a directory Ex-dir containing a text file File1.txt. I. Display the owner and group for the directory Ex-dir; (Take a screenshot of the command and its output) II. Change the group of the directory Ex-dir to Guest2; (Take a screenshot of the command) III. Change the permission mode of Ex-dir such that Guest 2 (as a group user) has permissions read...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT