March 14, 2017
Top 10 Network Security Threats and Their Security Measures
March 14, 2017
All the threat has been divided into three parts internal threat, system threat and external threat which are described below.
The following are the possible internal threats that affect your organization:
Internal Threats:Internal threat is the threat that originating inside the corporation and commonly an exploit by a dissatisfied employee denied promotion or informed of employee termination.
1. Employee theft:
Employee theft can be characterized as any stealing, utilize or abuse of business benefit without permission.
• Using biometric identification system.
• Secretly watching employee and encourage them to own their success.
Weak access control means the system is very weedy in a 3A (Authentication, Authorization, Accounting) security model and security process that controls use of particular assets inside of a predefined criteria.
• Strong password system with sufficient length to expand the difficulty it takes to split the password and they should be stored in the encrypted format.
• Making strong access control model policies (confidentiality, accountability, and integrity).
The peoples with rights who have extensive access to the resources of an organization might abuse it to satisfy their requirements or to destroy the organization reputation.
Security Measure: • Performs through background checks before issuance of privilege credentials.
• Bearing regular privilege user training.
The threat that harm physical equipment, hardware and system of organisation is system threat.
The possible system threats to organizations are:
1. Equipment failure:
Equipment failure refers to any occasion in which any equipment can't complete its intended task or reason. It can also mean that the hardware has stopped working.
• Regularly checking and maintenance of the physical equipment.
It refers to power surges and spikes which causes the electronic equipment to fail.
• Proper wiring and grounding of electronic equipment.
• Installing surge protector.
A threat that originating outside the organization or institution to the intention of damage or steal confidential information of that organization.
The possibly external threat for organization are listed below.
1. Malicious threat:
Malicious threat include Computer viruses, Trojan, worm and spyware. It is code or software that is particularly intended to damage, steal, disrupt, or as a rule inflict some other "terrible" or illegitimate activity on information, hosts, or network.
• Install antivirus software into the system and download updates to ensure that software has the latest fixes for new viruses, Trojans, worms and bots.
• Ensure that antivirus software can scan email and the all the files downloaded from the internet.
A Denial-of-Service (DOS) attack is an attack intended to close down a machine or network, making it unavailable to its intended users.
• Using Over-provisioning brute force defense.
• Configuring windows firewall and IP access lists.
Eavesdropping refers to the unauthorized monitoring of other people’s communications. It can be conducted on ordinary telephone systems, emails, instant messaging or other Internet services.
Security Measure: An electronic search of the radio frequency (RF) spectrum to detect any unauthorized emanations from the area being examined.
Use encrypted data using data transmission or conversation.
4. Data breaches:
A data breach is an occurrence in which sensitive, secured or confidential data has potentially been seen, stolen or utilized by an individual unapproved to do as such. In case of small organisation data breaches may involve personal information and intellectual property.
• Encrypting all the sensitive information and shred them before disposing.
• Retain the third party and limiting the staffs to access system and devices.
Phishing is the process to gain sensitive information like usernames, passwords and credit card information, frequently for malicious reasons, by taking on the appearance of a dependable element in an electronic correspondence.
• Keep websites certificates up to date so that users are assured the legitimacy of the websites.
• Educate users about the best practices that they should follow and observe when using Internet services.
A distributed Denial of Service (DDOS) attack is a challenge to make an online service inaccessible by overpowering it with traffic from numerous sources. It focus on wide range banking information and confidential data of any organization.
• Limit the rate of router to prevent form web server being overwhelmed
• Use of firewall and pack sniffing technique for controlling high packet traffic