57.7k views
1 vote
Identify and describe various issues related to network security

User BadAtLaTeX
by
5.4k points

1 Answer

4 votes

Answer:

Distributed Denial of Service Attacks

The number of DDoS attacks that businesses experience is growing each year. That is probably because these intrusions can do so much damage. They work like this: Hackers flood your networks with such a high volume of traffic that your systems are drastically slowed or even paralyzed altogether.

Often, bad actors target internet-of-things (IoT) products that have poor security protections in order to gain access to your internal systems. Once they have infiltrated your firewall perimeters, they can implant malware, steal data or commit identity fraud or numerous other types of criminal activity.

Effective firewalls, monitoring and early detection are the best defenses against these attacks. Mitigate your risks by implementing a preemptive DDoS plan to track your LAN and WAN network traffic flow and bandwidth usage so that you can react immediately if an anomaly appears.

Ransomware

You may have heard of ransomware, the nightmare attack that has brought many corporate operations to their knees by holding the business’s networks hostage until large amounts of cash are sent to the criminals. This significant information security issue is actually even more complex; it can result in corruption or loss of data as well. It works by exploiting unpatched computer workstations and automated software updates to barge into your systems.

The best way to protect your system from these malicious and destructive attacks is by employing common-sense cybersecurity measures such as ensuring that all programs and patches are updated regularly. Furthermore, you should invest in vulnerability assessment tools and auditing to furnish you with information about weaknesses or flaws in your defenses.

Cloud-based Malware

Relying on third-party vendors to manage and store your data offsite is definitely more secure than keeping it on your premises. However, the flipside is that hackers have figured out ways to take advantage of this behavior by exploiting the vulnerabilities in these systems. While your internal solutions may be ironclad, these weaknesses in your third-party security architecture can put your data and mobile and wireless devices at serious risk.

Implementing advanced threat intelligence monitoring and other analytics can give you a heads-up to guard against these network security issues.

Networking Threats From The Inside

While it is crucial to safeguard your perimeters with a robust public firewall, you need to be equally diligent in protecting your assets against networking security issues from users who already have authorized access and system rights and privileges. Employees do this type of damage for several reasons: to deliberately harm your business by stealing or compromising data, to commit industrial espionage to benefit a competitor or out of sheer carelessness or incompetence.

The best network security solution in this case is to implement a multi-layer defense that consists of prioritizing assets according to criticality, developing and implementing a clear insider threat policy that includes ongoing training and upgrades as systems evolve, strictly documenting and enforcing these policies and monitoring employee network activity.

Encrypted Network And Web Traffic

Encryption allows companies to protect the confidentiality of the information they store and send, but it also gives hackers a way to hide their malware so that it is harder to detect and neutralize. With these types of network security threats, one of the best remedies is the use of automated machine learning and artificial intelligence solutions that can analyze patterns in encrypted content and alert you should a potential risk be detected.

Social Engineering Attacks

Email is a vital communications tool that enables employees to share mission-critical information with coworkers and external collaborators. However, it is also one of the easiest ways for hackers to breach your security architecture. This network security risk can take place in numerous ways, many of which require the unwitting cooperation of end users.

In some instances, malware is hidden in commonly used Microsoft Word, Excel and PowerPoint file extensions. At other times, hackers launch phishing attacks, sending email messages appearing to come from legitimate sources that encourage the person to open malware-laden attachments or to provide sensitive company or personal identity data. Installing robust spam filters and keeping systems upgraded are helpful, but you must also implement and regularly conduct staff training to ensure that your employees know the red flags that often signal these common types of attacks.

Step-by-step explanation:

User Kerry Liu
by
5.1k points