Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: April 6th, 2022

Security Threats and Future Trends

Securing the Enterprise Infrastructure with Cyber Security Techniques
Name

introduced to concepts and methods for securing Microsoft Windows networks. We will also discuss security principles associated with securing networking services, and wireless networks are also explored.
ABSTRACT
Today the information technology industry faces numerous challenges mainly due to the fast changing trend where internet resources and networking services are becoming prime targets for cyber criminals. This development is often blamed on the fact that conventional techniques are unable to protect internet resources and networking services from different attacks while cyber criminals are also devising new tactics beat the existing defense mechanisms [3]. This paper analysis different network security threats to understand how they occur and give recommendations on how to establish the right protection against such threats. Additionally, the paper has also looked at the future evolution of network security risks. Finally, the paper concludes that the existing cyber security threats against network securities can only be defended using a combination of security intelligence and user training.
Introduction
Today there is huge growth of the internet in regards to its resources and usage. Nearly all educational institutions, commercial organizations, individuals and governments are leveraging on the internet to provide essential services [3]. Most of these organizations are able to perform their operations through the internet and other related networks. For example, thanks to advances made on the internet and other related networks, today educational institutions are able to share their research findings and educational materials online which is a speedy method of propagating information [3]. Based on these facts, it is quite evident that the internet and other related networks should operate in an environment where they run smoothly which can be enhanced through enhancing integrity and confidentiality of sensitive information passing through them. Unfortunately, the presence of vulnerabilities and configuration errors offers malicious users an opportunity to undertake various attacks with the intention of disrupting an organization’s network and compromising the integrity of the confidential information passing over the internet. Cyber attacks use malicious software and codes to deliberately exploit these computer systems while interfering with the security of a given network [3]. This paper aims to analyze different network security threats and make recommendations on how to establish the right protection against such threats while also looking at the future evolution of network security risks
Security Threats and Future Trends
With the dependence of information based individuals and organizations increasing on a daily basis, cyber criminals are looking to take advantage of this development to steal sensitive information. However, majority of the popular software being used to safeguard modern networks contain some configuration errors and vulnerabilities means that cyber criminals are keen to exploit such loopholes. As such, intruders misuse internet resources by exploiting these vulnerabilities to launch influential attacks. For example, after the wide spread vulnerabilities and exposure that internet and network vendors underwent through in 2012, a research study established that more than 70% of the host within organizations weren’t using updated software versions [6]. This finding implies that these hosts were exposed to numerous vulnerabilities that hackers were keen to exploit. Additionally, the research findings established that nearly 44% of the hosts in most organizations weren’t running updated versions of the Microsoft Windows Service Packs [8]. These services packs have the latest security updates of the Microsoft windows operating system and failure to run an updated version normally increases its security risks.
Today cyber threats are no longer just threats but they have become a daily reality. With these threats growing daily, there is a need to understand them so that the principles of information security can be adhered to effectively [1]. These principles of information security involve aspects such as integrity, confidentiality and availability. Understanding the motivation of these cyber attacks can help us to clearly project ( help with nursing paper writing from experts with MSN & DNP degrees) the expected future trends of these cyber attacks.
To prevent any financial loss, limit brand damage and protect customers, an organization has to enhance its network security. With security breaching tactics and malware threats growing and evolving daily, it is no longer enough to just purchase various security tools as a strategy to preventing future attacks. Instead, we must think of the different types of attack based on the motive behind them as this will help network security experts determine the best tactics to use to prevent them [5]. In other words, there is a need to depart from thinking that we can use technologies that only block attacks just at the periphery or the using signatures is enough to detect malware and keep enhance security.
As earlier suggested, the information technology industry faces numerous challenges mainly due to the fast changing trend where internet resources and networking services are becoming prime targets for cyber criminals. This development is often blamed on the fact that conventional techniques are unable to protect internet resources and networking services from different attacks while cyber criminals are also devising new tactics beat the existing defense mechanism [3]s. Based on these facts cyber threats are no longer just threats but they have become a daily reality and there is need to think of the different types of attack based on the motive behind them as this will help network security experts determine the best tactics to use to prevent them.
Recommendations
As established in this study, the presence of vulnerabilities and configuration errors offers malicious users an opportunity to undertake various attacks with the intention of disrupting an organization’s network and compromising the integrity of the confidential information passing over the internet [4]. As such, to avoid growing data loses as a result of insider attacks; it would be recommendable to establish a corporate policy that is automated since it will be able to catch most security incidents before attacks can cause serious harm on an organization. This solution would involve using a Data Loss Prevention mechanism since it has wide capabilities that can present organizations with numerous deployment options [4]. However, before deploying this DLP solution, the organizations will have to come up with a clear strategy that has concrete requirements.
There is need to care for users and their security policy. This recommendation requires that any security policy put in place to address these challenges has to be defined clearly to prevent any future cyber attacks [7]. Additionally, this policy has to stipulate clearly the different techniques that can be used to enhance this network security. This finding implies that these hosts were exposed to numerous vulnerabilities that hackers were keen to exploit.
Finally, security developers must strive to keep up with the evolution of the threats. As proposed, measures such as the development of an effective security policy, installation of anti-malware products, updating antivirus software, educating employees in organization and the enforcement of the security policies will be critical in securing the Microsoft Windows networks. Having these measures in place will ensure that Microsoft Windows networks are well protected using a dynamic approach that is responsive to the changing cyber security threats landscape.
Conclusion
Today, a huge number of organizational networks run on windows operating systems. With the increasing number of threats emanating from hackers and other loopholes, it would only be logical to ensure that secure security measures are implemented to secure Microsoft Windows networks. Across the globe, there are all indications that the number of threats will continue to grow. Therefore, security developers must strive to keep up with the evolution of the threats. As proposed, measures such as the development of an effective security policy, installation of anti-malware products, updating antivirus software, educating employees in organization and the enforcement of the security policies will be critical in securing the Microsoft Windows networks. Despite the challenges, Windows Operating systems continues to be an important host to various network systems and organizations. Effective implementation of the proposed methods will play a critical role in securing the networks.
References
[1]. I. Alsmadi, “Cyber Defense Analysis and Support,” The NICE Cyber Security Framework, pp. 53–73, 2019.
[2]. J. Conrad, “Seeking help: the important role of ethical hackers,” Network Security, vol. 2012, no. 8, pp. 5–8, 2012.
[3]. G. Kumar and K. Kumar, “Network security – an updated perspective,” Systems Science & Control Engineering, vol. 2, no. 1, pp. 325–334, 2014.
[4]. D. Lalitha, D. .Kamaraj, and M. Devan, “Anomaly Detection Techniques And Challenges On Big Data,” International Journal of Latest Trends in Engineering and Technology, vol. 9, no. 3, 2018.
[5]. A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007.
[6]. Verizon, “The 2012 data breach investigations report.,” www.verizonbusiness.com/ resources/reports/rp_2010-data-breach-report_en_xg.pdf, 2013. .
[7]. N. Virvilis and D. Gritzalis, “The Big Four – What We Did Wrong in Advanced Persistent Threat Detection?,” 2013 International Conference on Availability, Reliability and Security, 2013.
[8]. B. R. Yadav, B. S. Narayana, and D. Vasumati, “An Efficient Classifier approaches for Feature Reduction in Intrusion Detection,” International Journal of Computer Trends and Technology, vol. 26, no. 1, pp. 37–44, 2015.

Order | Check Discount

Tags: Best dissertation writing service UK, best essay writing services, best thesis writing services, business report writing services, cheap custom essay writing service

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00