In: Computer Science
Create a list of how organizations use common safeguards to protect other users on the network, such as firewalls, proxy servers, user names and passwords, access controls, and audit trails.
Building a Network Defense Mechanism
· Setting up well defined and secured Wireless Network
· Ensuring Strong Password practices or primarily using a password generator
· Managing roles and privileges
· Building Strong front line Firewall defense
· Involving an Intrusion Detection System
Installing Anti-Virus, Anti-Spyware and Anti-Malware solution
It is very critical to keep our systems safe from attacks like viruses, malwares and Spywares. For enabling this we need a very strong and updated database of Viruses, spywares and malwares globally affecting the system. Every day new viruses are released onto the open networks. These newly introduced viruses are strong as they are created taking into consideration the vulnerabilities of the security systems. Hence, it always required to keep a check on the activity or most specifically malicious activity performed by any unknown application or script and efficiently putting them in quarantine
Educating Users in terms of possible vulnerabilities
It is very critical for the users of the systems to understand the vulnerabilities of the network around them. There are multiple ways via which the users may fall prey to the attacks
· Dangerous Links
· Unsecured Sites
· Password Infringements
· Data Mishandling
· Email Phishing
Keeping all the Software’s up to date
The software makers always strive to ensure that their software’s are attack proof or of minimal vulnerabilities. Hence, to ensure that they release timely security patches to their customers. We should always check for any critical security updates available for legitimate and trusted software’s
Using only standardized and safe/recognized software’s
At times users may end up downloading misleading software’s that may have malicious intent behind its frontal working. One should ensure that they are using software’s which are marked as standardized by the organization. Make sure that all computers use the same:
· Operating System
· Browser Application
· Document / PDF application
· Plugins
Standardization assures less issues in terms of attack from unknown sources.
Implementing Duo/Multifactor Authentication
Having a Multifactor authentication adds up to the security of the credentials possessed by the individual. Encouraging the same enables a lot of safety from credential theft of the users.
Setting strict permissions for the Database systems
Setting up roles and restricting accesses as per the user responsibilities and allowing access of data only to the intended users.
Using proper SSLs, Digital signatures or certificates
SSLs, Digital Signatures, and digital certificates can be used whenever required to prove the authenticity of the user posing an entity on the internet
Regular Monitoring
For safeguarding the organizational infrastructure regular checks monitoring whether the standards are followed as per instructions and mock drills for cyber attacks are done by the IT Security Team
Constant Testing
Every system hosted on the portal should be tested for vulnerabilities as per the new upgrades in the overall system environment
Audit Trails
Audit trails maintain logs of system activity performed both by system and application processes and by the overall user activity on the systems and applications. In conjunction with tools and procedures, audit trails assist in identifying security infringements, performance issues, and defects in applications.
Access Control
Access Control is a mechanism that guarantees that the user who is asking for the access permissions is having those rights to access that particular data.
Proxy servers
The Proxy servers is basically a dummy or another computer system which serves as a hub through which internet request is processed. The computer sends your request to the server and then returns with the response. This mechanism avoids the direct exposure of the actual main system with the outside world