Balancing Network Risk and Cost by Scale

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Balancing Network Risk and Cost by Scale

Author: cyberwriter | Published on December 6, 2018 | Views: 528

It is not always an easy task determining which approach and what amount of resources are necessary to secure networks from cyber attacks. Protecting important information is essential when resources are at risk, but there are wasteful approaches and limited resources available to secure information. Depending on the type of organization to be secured and the nature of the information, an unlimited number of approaches can be taken to ensure proper security.

One important question to ask when assessing network vulnerability is whether or not to use open-source resources. Linux – like other open-source resources – allow users to carry out many different cybersecurity tasks, but their use requires time, complex steps, and appropriate training. I don’t know about you, but I didn’t just one day decide I wanted to work on a Linux OS device and then auto-magically know how to do it. Come on, this isn’t Windows we’re talking about here…

risk analysis vulnerability assessmentSometimes it is easier to simply purchase and install a specialized hardware device such as a Network Intrusion Detection System. These devices allow the organization to quickly and efficiently set up a network security device without the use of obscure or overly complex software. However, both approaches introduce the important factor of budget. A bank may not need the same security as a restaurant when it comes to computer networks, but both need some level of security to operate. More and more organizations are relying on computers and require network security measures to operate. Some systems are created just for the sake of it (“the internet of things”) and don’t do much but decrease operational security. If you’re a fan of Medium’s many authors and articles like me, I recommend reading this recent post by Tyler Elliot Bettilyon, which touches on some of these aspects. The risk is a product of the drive for greater automation and convenience, and it fuels the demand for cybersecurity measures, network penetration testing, and vulnerability assessment.

Ask these questions before determining a budget or specified approach towards securing an organization’s network:

  • How much security is really needed?
  • What are the potential losses of network security being compromised?
  • How valuable is the data stored in the network?
  • How much is the organization willing to dedicate towards securing the computer network?
  • Are there critical systems or potentially dangerous consequences to a network breach?

Once you have assessed what threats your organization would realistically deal with, assess what resources you have available to secure your network:

  • Is there someone in the organization who is familiar with advanced network security tools?
  • Is it reasonable to purchase network security equipment for the organization?

Overspending on network security could lead to losses in other aspects of the organization, and underspending on network security may create critical gaps in the organization’s security. Overall, ensure that worst-case-scenarios are avoided with training, keeping software up-to-date, and performing regular vulnerability assessments.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel