IT
LivesayJesse_TermPaperDraft

LivesayJesse_TermPaperDraft - ATTACK PREVENTION IN THE...

Info icon This preview shows pages 1–4. Sign up to view the full content.

ATTACK PREVENTION IN THE DIGITAL AGE 1 Attack Prevention in the Digital Age Jesse Livesay ISSC461 – IT Security Countermeasures March 02, 2016 Christopher Weppler
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

ATTACK PREVENTION IN THE DIGITAL AGE 2 Abstract The digital age has changed the way everyone operates from day to day. However, people tend to not realize how vulnerable digital devices are. The amount of information that is shared on the Internet is massive and can be used in a personal attack against anyone. Network and personal security should be a high priority for both individuals and information technology departments. Cyber-attacks are increasing every year and are also causing more and more damage and data loss in companies. Ensuring security in layers is one of the best methods used in networks security today and allows for a much more secure environment will also adhering to the CIA triad. Preventing cyber-attacks is a crucial part of every information technology department but should also be a part of everyone’s mindset when accessing resources in the Internet. Users should be vigilant of fraudulent websites, hoax emails, and possible malware so that they can remain safe and still enjoy the digital age and all it offers. Keywords: Cyber-attacks, CIA triad, network security, security in layers, data loss, information, digital age.
Image of page 2
ATTACK PREVENTION IN THE DIGITAL AGE 3 Introduction Today’s networks are growing in both diversity and complexity. From the end users to the back end servers that host network resources, the infrastructure is becoming cumbersome and at times difficult to manage without a properly documented management plan. With the increase in demand for more access to network and company resources information technology departments must get creative in the way they protect their data. Cyber-attacks happen daily to all types of companies big and small therefore enforcing the proper protection measures will help reduce the chances of a breach. In 2014, 44 percent of breaches were caused by unpatched systems, according to Thompson (2015). Patching systems is typically one of the simplest items for an information technology department among others. When conducting a review of the overall security of a company’s information technology department the forefront application of confidentiality, integrity, and availability (also known as the CIA triad) should be implemented. Enforcing the CIA triad at all levels of security has proven to significantly reduce the attack surface while also allowing network access to users. To begin physical security should be a baseline in all information technology departments. Physical Security Pfleeger & Pfleeger (2012) explains that the physical security can range from uninterruptible power supplies to fire suppressing systems or even selecting the right building for physical security (pg. 280). Depending on the demands of the company an elaborate fire suppression system located in the main server room may not be warranted but an uninterrupted power supply should be on every checklist. Servers are the workhorses in a network consisting of
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern