Mitigating External Cyber-Attacks

Only available on StudyMode
  • Download(s) : 198
  • Published : May 18, 2013
Open Document
Text Preview
You Decide Activity 1

Mitigating external cyber-attacks
William Dilly
Keller University SEC572

External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks. Since there is no 100% method to stop external cyber-attacks, attention to detail must be made in regards to proper configuration of the network to include state of the art hardware and software. To include current security patches for both software and hardware respectively. Additionally, hardware and software measures will be limited in their effectiveness without network policies and techniques to protect against external cyber-attacks such as Denial of Service, Distributed Denial of Service, Masquerading and IP Spoofing, Smurf Attacks, Land c Attacks, and Man-in-the-Middle attacks. In close coordination with our IS team engineers and IT network director an approved plan has been incorporated to minimize risk of an effective cyber-attack on our network. Specifically this plan covers a comprehensive review of current network design and interdependencies, Standard Operating Procedures, Emergency Operating Procedures, detailed analysis of every program, service, host, router, switch to include interaction between these services and resources.

Testing current system and policies by a certified third party security consultant on a not to interfere basis will provide invaluable insight on our network. Additionally, weekly...
tracking img