Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: October 10th, 2022

Security Threats and Future Trends

Securing the Enterprise Infrastructure with Cyber Security Techniques
Name

introduced to concepts and methods for securing Microsoft Windows networks. We will also discuss security principles associated with securing networking services, and wireless networks are also explored.
ABSTRACT
Today the information technology industry faces numerous challenges mainly due to the fast changing trend where internet resources and networking services are becoming prime targets for cyber criminals. This development is often blamed on the fact that conventional techniques are unable to protect internet resources and networking services from different attacks while cyber criminals are also devising new tactics beat the existing defense mechanisms [3]. This paper analysis different network security threats to understand how they occur and give recommendations on how to establish the right protection against such threats. Additionally, the paper has also looked at the future evolution of network security risks. Finally, the paper concludes that the existing cyber security threats against network securities can only be defended using a combination of security intelligence and user training.
Introduction
Today there is huge growth of the internet in regards to its resources and usage. Nearly all educational institutions, commercial organizations, individuals and governments are leveraging on the internet to provide essential services [3]. Most of these organizations are able to perform their operations through the internet and other related networks. For example, thanks to advances made on the internet and other related networks, today educational institutions are able to share their research findings and educational materials online which is a speedy method of propagating information [3]. Based on these facts, it is quite evident that the internet and other related networks should operate in an environment where they run smoothly which can be enhanced through enhancing integrity and confidentiality of sensitive information passing through them. Unfortunately, the presence of vulnerabilities and configuration errors offers malicious users an opportunity to undertake various attacks with the intention of disrupting an organization’s network and compromising the integrity of the confidential information passing over the internet. Cyber attacks use malicious software and codes to deliberately exploit these computer systems while interfering with the security of a given network [3]. This paper aims to analyze different network security threats and make recommendations on how to establish the right protection against such threats while also looking at the future evolution of network security risks
Security Threats and Future Trends
With the dependence of information based individuals and organizations increasing on a daily basis, cyber criminals are looking to take advantage of this development to steal sensitive information. However, majority of the popular software being used to safeguard modern networks contain some configuration errors and vulnerabilities means that cyber criminals are keen to exploit such loopholes. As such, intruders misuse internet resources by exploiting these vulnerabilities to launch influential attacks. For example, after the wide spread vulnerabilities and exposure that internet and network vendors underwent through in 2012, a research study established that more than 70% of the host within organizations weren’t using updated software versions [6]. This finding implies that these hosts were exposed to numerous vulnerabilities that hackers were keen to exploit. Additionally, the research findings established that nearly 44% of the hosts in most organizations weren’t running updated versions of the Microsoft Windows Service Packs [8]. These services packs have the latest security updates of the Microsoft windows operating system and failure to run an updated version normally increases its security risks.
Today cyber threats are no longer just threats but they have become a daily reality. With these threats growing daily, there is a need to understand them so that the principles of information security can be adhered to effectively [1]. These principles of information security involve aspects such as integrity, confidentiality and availability. Understanding the motivation of these cyber attacks can help us to clearly project the expected future trends of these cyber attacks.
To prevent any financial loss, limit brand damage and protect customers, an organization has to enhance its network security. With security breaching tactics and malware threats growing and evolving daily, it is no longer enough to just purchase various security tools as a strategy to preventing future attacks. Instead, we must think of the different types of attack based on the motive behind them as this will help network security experts determine the best tactics to use to prevent them [5]. In other words, there is a need to depart from thinking that we can use technologies that only block attacks just at the periphery or the using signatures is enough to detect malware and keep enhance security.
As earlier suggested, the information technology industry faces numerous challenges mainly due to the fast changing trend where internet resources and networking services are becoming prime targets for cyber criminals. This development is often blamed on the fact that conventional techniques are unable to protect internet resources and networking services from different attacks while cyber criminals are also devising new tactics beat the existing defense mechanism [3]s. Based on these facts cyber threats are no longer just threats but they have become a daily reality and there is need to think of the different types of attack based on the motive behind them as this will help network security experts determine the best tactics to use to prevent them.
Recommendations
As established in this study, the presence of vulnerabilities and configuration errors offers malicious users an opportunity to undertake various attacks with the intention of disrupting an organization’s network and compromising the integrity of the confidential information passing over the internet [4]. As such, to avoid growing data loses as a result of insider attacks; it would be recommendable to establish a corporate policy that is automated since it will be able to catch most security incidents before attacks can cause serious harm on an organization. This solution would involve using a Data Loss Prevention mechanism since it has wide capabilities that can present organizations with numerous deployment options [4]. However, before deploying this DLP solution, the organizations will have to come up with a clear strategy that has concrete requirements.
There is need to care for users and their security policy. This recommendation requires that any security policy put in place to address these challenges has to be defined clearly to prevent any future cyber attacks [7]. Additionally, this policy has to stipulate clearly the different techniques that can be used to enhance this network security. This finding implies that these hosts were exposed to numerous vulnerabilities that hackers were keen to exploit.
Finally, security developers must strive to keep up with the evolution of the threats. As proposed, measures such as the development of an effective security policy, installation of anti-malware products, updating antivirus software, educating employees in organization and the enforcement of the security policies will be critical in securing the Microsoft Windows networks. Having these measures in place will ensure that Microsoft Windows networks are well protected using a dynamic approach that is responsive to the changing cyber security threats landscape.
Conclusion
Today, a huge number of organizational networks run on windows operating systems. With the increasing number of threats emanating from hackers and other loopholes, it would only be logical to ensure that secure security measures are implemented to secure Microsoft Windows networks. Across the globe, there are all indications that the number of threats will continue to grow. Therefore, security developers must strive to keep up with the evolution of the threats. As proposed, measures such as the development of an effective security policy, installation of anti-malware products, updating antivirus software, educating employees in organization and the enforcement of the security policies will be critical in securing the Microsoft Windows networks. Despite the challenges, Windows Operating systems continues to be an important host to various network systems and organizations. Effective implementation of the proposed methods will play a critical role in securing the networks.
References
[1]. I. Alsmadi, “Cyber Defense Analysis and Support,” The NICE Cyber Security Framework, pp. 53–73, 2019.
[2]. J. Conrad, “Seeking help: the important role of ethical hackers,” Network Security, vol. 2012, no. 8, pp. 5–8, 2012.
[3]. G. Kumar and K. Kumar, “Network security – an updated perspective,” Systems Science & Control Engineering, vol. 2, no. 1, pp. 325–334, 2014.
[4]. D. Lalitha, D. .Kamaraj, and M. Devan, “Anomaly Detection Techniques And Challenges On Big Data,” International Journal of Latest Trends in Engineering and Technology, vol. 9, no. 3, 2018.
[5]. A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007.
[6]. Verizon, “The 2012 data breach investigations report.,” www.verizonbusiness.com/ resources/reports/rp_2010-data-breach-report_en_xg.pdf, 2013. .
[7]. N. Virvilis and D. Gritzalis, “The Big Four – What We Did Wrong in Advanced Persistent Threat Detection?,” 2013 International Conference on Availability, Reliability and Security, 2013.
[8]. B. R. Yadav, B. S. Narayana, and D. Vasumati, “An Efficient Classifier approaches for Feature Reduction in Intrusion Detection,” International Journal of Computer Trends and Technology, vol. 26, no. 1, pp. 37–44, 2015.

Order | Check Discount

Tags: APN nursing help, assignment help online free help with assignment online, assignment help website, best website for nursing assignment, college homework help websites

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.