My selected tech topic, Network Security, connects to the fundamentals of
information technology covered in this course on all topics. From a programming
language perspective, an attacker can inject malicious code that can alter the
outcome for the end-user or direct them to a server that can install malware.
As far as Web/Mobile Applications, an attacker can modify an application that
can listen or record your private life. Computers in the workplace are the main
target for an attacker; this can be done by phishing, installing trojans,
viruses, worms, or hacking a password with elevated privileges. All of these
concepts relate to Network security and computer science, in one form or the
other, for example, an attacker and flood certain type of the network by using
the ping command creating a denial of service attack, one example taking down a
website by crashing it, thus creating a denial to enter such site; a website
such as healthcare.gov is another example. Servers store information that can
be compromised; a brute force attack can be devastating to an organization.
Equally important is stealing such information from a database and hold it for
ransom. Network Security is critical to be able to maintain such information.
Management must use best practices to analyze and prevent this type of attack. With
a network security system that can run on multiple
servers, the attack prevention process can be done faster because when one
server detects an attack, another server will take precautions by retrieving
the information that has entered the collector database synchronizing all
servers other servers can prevent attacks before an attack occurs on that
server.. One example of such attack is the healthcare government website, Idhom, M., Wahanani, H. E., & Fauzi, A.
(2020). Network Security System on Multiple Servers Against Brute Force
Attacks. 2020 6th Information Technology International Seminar (ITIS),
Information Technology International Seminar (ITIS), 2020 6th, 258–262.
Network Security in an infrastructure environment relies on hardware
components such as Firewalls. This Firewalls must be updated with the latest
patches to prevent attackers from infiltrating the network with old
vulnerabilities. Other methods of protecting the network is through programming
switches and routers to prevent man-in-the-middle attacks. Application software
plays a big role in protecting network access, such as two-way factor
authentication. My chosen topic relates to database management in protecting
infiltrators from injecting SQL attacks. Network architecture must be analyzed
to prevent loopholes and vulnerabilities. Security Management should have
documentation of security best practices, have a macro view of the network,
access policies and configuration compliance, simulate attacks; one example is
to hire a third-party vendor to infiltrate and/or penetrate the network. And
continuously find other methods to test and find security flaws. With
visibility on both the network and device level, tremendous amounts of data are
translated into intelligence that deciphers complicated network security
transactions into manageable, actionable information. With this insight, attack
simulation can then prioritize vulnerabilities and eliminate the attack vectors
that are most critical to the organization, protecting business services and
data. Finally, change management can automate and optimize security processes
to improve security and reduce the security”. Best practices for network security management." Network
World 30 Jan. 2014. Business Insights: Global. Web. 18 Feb. 2021.URLhttp://bi.gale.com.proxylibrary.ashford.edu/global/article/GALE%7CA357439690?u=ashford
Document Number:GALE|A357439690
No comments:
Post a Comment