Mitigating External Cyber-Attacks

Topics: Information security, Security, Denial-of-service attack Pages: 2 (615 words) Published: May 18, 2013
You Decide Activity 1

Mitigating external cyber-attacks
William Dilly
Keller University SEC572

External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks. Since there is no 100% method to stop external cyber-attacks, attention to detail must be made in regards to proper configuration of the network to include state of the art hardware and software. To include current security patches for both software and hardware respectively. Additionally, hardware and software measures will be limited in their effectiveness without network policies and techniques to protect against external cyber-attacks such as Denial of Service, Distributed Denial of Service, Masquerading and IP Spoofing, Smurf Attacks, Land c Attacks, and Man-in-the-Middle attacks. In close coordination with our IS team engineers and IT network director an approved plan has been incorporated to minimize risk of an effective cyber-attack on our network. Specifically this plan covers a comprehensive review of current network design and interdependencies, Standard Operating Procedures, Emergency Operating Procedures, detailed analysis of every program, service, host, router, switch to include interaction between these services and resources.

Testing current system and policies by a certified third party security consultant on a not to interfere basis will provide invaluable insight on our network. Additionally, weekly...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cyber Attacks Essay
  • cyber crime Essay
  • An Overview Of Cyber Attack Essay
  • cyber attacks Essay
  • Essay on Effects of a Cyber Attack
  • Redistan Cyber Attack Essay
  • Catastrophic Cyber Attack Essay
  • spam and cyber attacks Research Paper

Become a StudyMode Member

Sign Up - It's Free