Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: March 30th, 2022

Network Security Defense

Network Security Defense
Organizations should consider the ever-growing sophistication of attacks to avoid falling victim to intrusions that disrupt day to day business activities. Network administrators are expected to protect the network by educating employees on social engineering attacks and creating an incidence response team. Besides that, additional measures that focus on the logical aspect of the network should be implemented. Such measures involve integrating network protection techniques such as firewalls, enforcing segmentation, collecting and analyzing logs, ensuring proper access controls, and using IDS/IPS systems. System logging could be a reliable way to fortify businesses against cyber-attacks such as worms, viruses, DoS attacks, spyware, and other such system intrusions, for it aids monitor human behavior on the network.
Social engineering attacks are the leading cause of cyber-attacks as they prey on the human factor. The most common of these attacks are phishing, tailgating, pretexting, baiting, and quid pro quo (Bisson, 2019). These attacks use tactics that exploit human psychology it h such as emotions of fear, greed, curiosity, urgency, and helpfulness. An example of such an attack that preys on fear sends individuals mails telling them to call a certain number to clarify their tax returns if they do not want to face arrest. The best way to reduce social engineering attacks is to educate employees with the hopes of changing behavior (Bisson, 2019). Some of the recommendations to give employees during such training include: avoiding emails from untrusted sources, locking laptops when not in use, updating antivirus-software, and adhering to the company’s privacy policy.
System logging is recording and monitoring all the events that occur when a computer is turned on. These events range from firewall updates to logins to emails. An electronic audit log file is usually examined during monitoring to determine whether any unauthorized activities took place (Miller, 2019). If unauthorized activities are detected, the file is transferred to a central database for further investigation. Logging processes are important because they keep the system responsive and agile to events such as weaponization, reconnaissance on the network environment, command and controls, installation of malware, and determining the adversary (Miller, 2019). An organization benefits from system logging because it helps the IT security team to detect breaches, reconstruct events, and create speedy recovery processes.
Upon detecting an incident, there is a need to evaluate certain logs that may lead to the problem (Glover, n.d). Password changes are some of the logs to analyze as they may narrow the search down to the activities performed by those accounts. Unauthorized loggings are also another area to consider as they point to malicious access to the network. Login failures and new login events are also indicators of suspicious activities. Besides those, file name changes, file integrity changes, and file auditing are crucial logs to consider during an incident investigation. New user accounts and disconnected events can also be evaluated when all else fails to yield results.
Overall, the issue of socially engineered attacks can be mitigated by system logging. Since logging gives a record of all events within a network, it becomes easy to identify the most recent logins and failed or unauthorized activities. However, the aspect of educating employees should not be neglected since they are the center point when interacting on the network. Both logical and personnel approaches should be considered to achieve holistic security measures.
References
Bisson, D. (2019). 5 Social Engineering Attacks to Watch out For. Retrieved from https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/
Glover, G. (n.d). The importance of Lg Management. Retrieved from https://www.securitymetrics.com/blog/importance-log-management
Miller, J. (2019). What is Security Logging and Monitoring? Retrieved from https://www.bitlyft.com/what-is-security-logging-and-monitoring/

Order | Check Discount

Tags: best assignment help websites in canada, best nursing paper writing service, buy psychology essay, Cheap Psychology Essay Writing Service, dissertation assignment help, History Dissertation Writing Services by UK Writers

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00