Network Security Plan1Network Security PlanCapella UniversityIT-FP2250 Intro to Network TechnologySeptember 12, 2021
Network Security Plan2All businesses need to have a proper network security plan to protect their data from theever-growing threat of cyber attacks or accidental deletion of company data. A sound andstraightforward security plan helps businesses plan for the inevitable or react to the unthinkableshould it happen. A well-written plan should contain the vulnerabilities, risks, or issues that thecompany may face and how to prevent or mitigate each one.Vulnerabilities, Risks, and IssuesVulnerabilities, risks, and issues are all common yet different unavoidable problems thatan IT department faces daily. According to (Firch, n.d.), a vulnerability is a weakness in the ITdepartment's software, hardware, or organization that can lead to a security breach. Commonvulnerabilities include malware, outdated or unpatched software, single-factor authentication,weak passwords, firewalls not being configured correctly, mobile devices, improper backups,and unsecured emails (CEI, 2021). Furthermore, according to (HealthTech, 2020), the mostcommon vulnerabilities for healthcare are single-factor authentication, a man-in-the-middleattack, and outdated software, including the operating system. Refer to table 1 for a list of thesevulnerabilities and a brief description of what they are.MalwareShort for malicious software and includes spyware, virus, ransomware, bots,and adware. It is a program designed to harm a computer system(Lutkevich,2020).Outdated/UnpatchedsoftwareOutdated software is any software that the vendor no longer supports.Outdated software will no longer have security patches updated (Reed,2021).Unpatched software is known to have flaws but has not been fixed(StorageCraft Technology, LLC, 2020).WeakpasswordsAny password that is commonly used or easily guessed.ImproperfirewallconfigurationFirewalls that are not appropriately secured can allow unwanted traffic andusers into a network. Once access is gained, a hacker can access confidentialinformation or shut down systems (Firch, n.d.).
Network Security Plan3Mobile devicesMobile devices using Bluetooth or are connected to an unsecured WiFi cancreate a backdoor for hackers to gain access to passwords, emails, and anyother private and confidential information you have on your device (Firch,n.d.).ImproperbackupsNot having adequate backups or no backups at all can leave your business ina bad situation if a cyber attack or even a natural disaster should occur(Firch, n.d.).
Want to read all 9 pages?
Previewing 4 of 9 pages Upload your study docs or become a member.
Want to read all 9 pages?
Previewing 4 of 9 pages Upload your study docs or become a member.
End of preview
Want to read all 9 pages? Upload your study docs or become a member.