Tech Topic Connection Post#7

 

My selected tech topic, Network Security, connects to the fundamentals of information technology covered in this course on all topics. From a programming language perspective, an attacker can inject malicious code that can alter the outcome for the end-user or direct them to a server that can install malware. As far as Web/Mobile Applications, an attacker can modify an application that can listen or record your private life. Computers in the workplace are the main target for an attacker; this can be done by phishing, installing trojans, viruses, worms, or hacking a password with elevated privileges. All of these concepts relate to Network security and computer science, in one form or the other, for example, an attacker and flood certain type of the network by using the ping command creating a denial of service attack, one example taking down a website by crashing it, thus creating a denial to enter such site; a website such as healthcare.gov is another example. Servers store information that can be compromised; a brute force attack can be devastating to an organization. Equally important is stealing such information from a database and hold it for ransom. Network Security is critical to be able to maintain such information. Management must use best practices to analyze and prevent this type of attack. With a network security system that can run on multiple servers, the attack prevention process can be done faster because when one server detects an attack, another server will take precautions by retrieving the information that has entered the collector database synchronizing all servers other servers can prevent attacks before an attack occurs on that server.. One example of such attack is the healthcare government website, Idhom, M., Wahanani, H. E., & Fauzi, A. (2020). Network Security System on Multiple Servers Against Brute Force Attacks. 2020 6th Information Technology International Seminar (ITIS), Information Technology International Seminar (ITIS), 2020 6th, 258–262.

Network Security in an infrastructure environment relies on hardware components such as Firewalls. This Firewalls must be updated with the latest patches to prevent attackers from infiltrating the network with old vulnerabilities. Other methods of protecting the network is through programming switches and routers to prevent man-in-the-middle attacks. Application software plays a big role in protecting network access, such as two-way factor authentication. My chosen topic relates to database management in protecting infiltrators from injecting SQL attacks. Network architecture must be analyzed to prevent loopholes and vulnerabilities. Security Management should have documentation of security best practices, have a macro view of the network, access policies and configuration compliance, simulate attacks; one example is to hire a third-party vendor to infiltrate and/or penetrate the network. And continuously find other methods to test and find security flaws. With visibility on both the network and device level, tremendous amounts of data are translated into intelligence that deciphers complicated network security transactions into manageable, actionable information. With this insight, attack simulation can then prioritize vulnerabilities and eliminate the attack vectors that are most critical to the organization, protecting business services and data. Finally, change management can automate and optimize security processes to improve security and reduce the security”. Best practices for network security management." Network World 30 Jan. 2014. Business Insights: Global. Web. 18 Feb. 2021.URLhttp://bi.gale.com.proxylibrary.ashford.edu/global/article/GALE%7CA357439690?u=ashford Document Number:GALE|A357439690

No comments:

Post a Comment

About Me