Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Today we see various proactive measures in use. For example, banks may use thick steel and concrete vaults with the latest electronic security system to prevent break-ins. While convenience stores may place cameras in visible sight to record business activities, as well as, deter possible theft.

Although I lack the experience in role of a professional working in a Network Security Center, I believe one of the goals or main goal for those security professionals is to prevent host based or network-based attacks that would compromise a system. One common example today for most companies is that they may own thousands of endpoints around the world that run multiple operating systems and applications from various vendors.

While assuming the task to make sure software on those endpoints are not susceptible to dangerous vulnerabilities from a missing patch update or user embedded, it is important that proactive measures are always set. From research on the current topic, Farhat et al (2011) recommends developing a compliance work plan.

The plan must include your cyber-attack procedures, in combination with other compliance matters such as policies, code of conduct, training, and specific incident response procedures.

In most companies, a majority of employees may not read the specific details for use of computers on the network when signing on to gain access.

In return, employees introduce worms or viruses that may cause damage to the system infrastructure when not knowing the appropriate network use. Vacca (2014) states that the fundamental goals of a security policy are: "to allow uninterrupted access to the network resources for authenticated users and to deny access to unauthorized users" (p. 263).

Farhat et al (2011) also recommends that companies should invest in security equipment and procedures to deter or prevent cyber-attacks. Those measures include applying the latest security patches, protecting all passwords, developing network security architecture, monitoring activities and procedures of third-party contractors (p. 3)

I think having effective patching processes in place, employee training on the network and use policy, and investing in your equipment are some of the ways to have proactive measures for your network.

The list doesn't stop there, but having plans such as a Cyber Incident Response, knowing cybercrime law, and mitigation against cyber-attacks go a long way. 2 Timothy 3:16-17 says, "All Scripture is breathed out by God and profitable for teaching, for reproof, for correction, and for training in righteousness, that the man of God may be competent, equipped for every good work." As security professionals, it may be a common theme to continually teach and learn so that they may uphold the posture of their company's network.

Through this training the professionals are given in their careers their goal is to perform good work.

References: Vaca, J. R. (2014). Network and System Security (2nd ed.) Waltham, MA: Syngress/Elsevier. ISBN:9780124166899.19. Farhat, V., McCarthy, B., Raysman, R., Holland & Knight LLP. (2011).

Cyber Attacks Prevention and Proactive Responses. Vince Farhat, Bridget McCarthy and Richard Raysman, Holland & Knight LLP

Article with reference in APA format.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92407222
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

One of the assays your laboratory carries out requires a 2n

One of the assays your laboratory carries out requires a 2N HCl. You have a stock bottle of concentrated HCl with a specific gravity of 1.18 and purity of 36%. What volume of the concentrated HCl is required to make 250m ...

The manufacture of an over-the-counter heartburn relief

The manufacture of an over-the-counter heartburn relief medication claims that it's Product brings relief in less than 3.5 minutes, on average. To be able to make the screen, the manufacturer was required by the FDA to p ...

Show how someone who is on the no-fly list can manage to

Show how someone who is on the no-fly list can manage to fly provided that boarding passes could be generated online (as an HTML page) and then printed. Please provide a step-by-step description of the attack. Which addi ...

A survey is taken of people in the class of favorite flavor

A survey is taken of people in the class of favorite flavor of ice cream among a forced choice of chocolate, vanilla, or strawberry. 70% prefer chocolate, 20% prefer vanilla, and 10% prefer strawberry. a) What is the ent ...

Why are we in the golden age of technology entrepreneurship

Why are we in the 'golden age' of technology entrepreneurship? What factors are helping entrepreneurs more rapidly achieve their vision, and with a lower cost?

You get hired as a machine learning expert at moviescom

You get hired as a Machine learning expert at movies.com. Your task on day one is to improve the performance of a classifier. You divide the data into 2 parts training, and testing. You learn a model from the training da ...

Your task is to implement the simple elevator in python

Your task is to implement the simple elevator in Python using classes. The default strategy is the simple "start at the bottom, go to the top, then go to the bottom". Can you write a better strategy one that is more effi ...

A chemistry student needsnbsp700 ml of dimethyl sulfoxide

A chemistry student needs 70.0 mL of dimethyl sulfoxide for an experiment. By consulting the  CRC Handbook of Chemistry and Physics , the student discovers that the density of dimethyl sulfoxide is 1.10 g.cm^-3. Calculat ...

Question process designoperations management involves

Question: Process Design Operations management involves various activities, such as process design, selection, management of information technology, work systems, planning and development, and quality assurance (Slack, C ...

What are content management systems cms describe the

What are Content Management Systems (CMS). Describe the challenges in implementing and maintaining CMS. Can internet search engines be considered as Content Management Systems - explain your answer.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As