Top 10 Network Security Threats and Their Security Measures

March 14, 2017 | Views: 52002

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Nowadays cyber-threats are becoming a daily headache for IT security staff, it supports to have some guidance, or at least identify what to look out for. As a small company doing business on the web, you need to be aware of these methods so you can be extra vigilant when online.
All the threat has been divided into three parts internal threat, system threat and external threat which are described below.

 

Internal Threats:

 

Internal threat is the threat that originating inside the corporation and commonly an exploit by a dissatisfied employee denied promotion or informed of employee termination.

The following are the possible internal threats that affect your organization:

1. Employee theft: 
Employee theft can be characterized as any stealing, utilize or abuse of business benefit without permission.
Security Measure:

• Using biometric identification system.
• Secretly watching employee and encourage them to own their success.

2. Weak access control:
Weak access control means the system is very weedy in a 3A (Authentication, Authorization, Accounting) security model and security process that controls use of particular assets inside of a predefined criteria.
Security Measure:

• Strong password system with sufficient length to expand the difficulty it takes to split the password and they should be stored in the encrypted format.
• Making strong access control model policies (confidentiality, accountability, and integrity).

3. Privilege abuse:
The peoples with rights who have extensive access to the resources of an organization might abuse it to satisfy their requirements or to destroy the organization reputation.
Security Measure: • Performs through background checks before issuance of privilege credentials.

• Bearing regular privilege user training.

System threats

The threat that harm physical equipment, hardware and system of organisation is system threat.


The possible system threats to organizations are:

1. Equipment failure:
Equipment failure refers to any occasion in which any equipment can’t complete its intended task or reason. It can also mean that the hardware has stopped working.
Security Measure:

• Regularly checking and maintenance of the physical equipment.

2. Power fluctuation:
It refers to power surges and spikes which causes the electronic equipment to fail.
Security Measure:

• Proper wiring and grounding of electronic equipment.
• Installing surge protector.

External threats

A threat that originating outside the organization or institution to the intention of damage or steal confidential information of that organization.


The possibly external threat for organization are listed below.

1. Malicious threat:
Malicious threat include Computer viruses, Trojan, worm and spyware. It is code or software that is particularly intended to damage, steal, disrupt, or as a rule inflict some other “terrible” or illegitimate activity on information, hosts, or network.
Security measure: 

• Install antivirus software into the system and download updates to ensure that software has the latest fixes for new viruses, Trojans, worms and bots.
• Ensure that antivirus software can scan email and the all the files downloaded from the internet.

2. DOS attack:
A Denial-of-Service (DOS) attack is an attack intended to close down a machine or network, making it unavailable to its intended users.
Security Measure:

• Using Over-provisioning brute force defense.
• Configuring windows firewall and IP access lists. 

3. Eavesdropping:
Eavesdropping refers to the unauthorized monitoring of other people’s communications. It can be conducted on ordinary telephone systems, emails, instant messaging or other Internet services.
Security Measure: An electronic search of the radio frequency (RF) spectrum to detect any unauthorized emanations from the area being examined.
Use encrypted data using data transmission or conversation.

4. Data breaches:
A data breach is an occurrence in which sensitive, secured or confidential data has potentially been seen, stolen or utilized by an individual unapproved to do as such. In case of small organisation data breaches may involve personal information and intellectual property. 
Security measure:

• Encrypting all the sensitive information and shred them before disposing.
• Retain the third party and limiting the staffs to access system and devices.

5. Phishing:
Phishing is the process to gain sensitive information like usernames, passwords and credit card information, frequently for malicious reasons, by taking on the appearance of a dependable element in an electronic correspondence.
Security Measure:

Keep websites certificates up to date so that users are assured the legitimacy of the websites.
• Educate users about the best practices that they should follow and observe when using Internet services.

6. D-DOS attack
A distributed Denial of Service (DDOS) attack is a challenge to make an online service inaccessible by overpowering it with traffic from numerous sources. It focus on wide range banking information and confidential data of any organization.
Security Measure:

• Limit the rate of router to prevent form web server being overwhelmed
• Use of firewall and pack sniffing technique for controlling high packet traffic

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
7 Comments
  1. A coworker of mine were just discussing this. Employees didn’t want a new simple security feature but they are not aware of inside disgruntled employees and or what we see on a daily bases as far as malicious activity. Good read!

  2. Good read! Thanks for putting this together!

  3. Good article and most importantly insightful post

    Under Power fluctuations, you could add: UPS to provide backup power in the event of an outage

  4. Thanks for posting…enjoyed the read!!!

  5. Good and precise article. Thanks for this 🙂 +10

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel