0% found this document useful (0 votes)
140 views3 pages

Research Paper

Organizations can prevent network attacks by taking various security measures. Major network attacks include phishing, insider threats, privilege escalation, code injection, man-in-the-middle attacks, and distributed denial of service attacks. Organizations should make users aware of these threats, implement robust endpoint security, upgrade authentication, harden applications, and conduct penetration testing. Incident response plans should have senior leadership buy-in, employee education, network monitoring, prompt software patching, and preparation for worst-case scenarios. Basic security practices like keeping systems updated and passwords strong can help mitigate cyber threats.

Uploaded by

Gitanjali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views3 pages

Research Paper

Organizations can prevent network attacks by taking various security measures. Major network attacks include phishing, insider threats, privilege escalation, code injection, man-in-the-middle attacks, and distributed denial of service attacks. Organizations should make users aware of these threats, implement robust endpoint security, upgrade authentication, harden applications, and conduct penetration testing. Incident response plans should have senior leadership buy-in, employee education, network monitoring, prompt software patching, and preparation for worst-case scenarios. Basic security practices like keeping systems updated and passwords strong can help mitigate cyber threats.

Uploaded by

Gitanjali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

How can

organizations prevent network attacks

Cyber Security plays an important role in the field of information technology


.Securing the information have become one of the biggest challenges in the present
day.
When ever we think about the cyber security the first thing that comes to our mind
is cyber crimes which are increasing immensely day by day. Various Governments and
companies are taking many measures in order to prevent these cyber crimes. Besides
various measures cyber security is still a very big concern to many. This paper
mainly focuses on challenges faced by cyber security on the latest technologies .It
also focuses on latest about the cyber security techniques, ethics and the trends
changing the face of cyber security.

Network security is a specialized field consisting of the provisions and policies


to prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources as well as ensuring their
availability through proper procedures. Many security devices are being developed
and
deployed to defend against cyber threats and to prevent unintended data breaches.
In spite of all these efforts, the ‘golden age’ of cyber crime continues,
as organizations around the world continue to suffer data breaches and security
attacks. What kinds of threats we are facing today? How these threats are to be
dealt with? The goal of this paper is to communicate an updated perspective of
network security for organizations, and researchers in the field and present some
recommendations to tackle the current situation of security threats.

Network attacks:

Phishing
It starts with a fraudulent email or other communication that is designed to lure a
victim. The message is made to look as though it comes from a trusted sender.
If it fools the victim, he or she is coaxed into providing confidential
information, often on a scam website. Sometimes malware is also downloaded onto the
target’s computer.

Insider threats, Privilege escalation, Code and SQL injection attacks, Man in the
middle attacks, Distributed denial of service attacks, Unauthorized access

The major issue is that people are not aware about these attacks and hence, they
become the victims to these attack. so, in this modern era of technology first of
all we have to make
people aware about it. Even the latest technologies like cloud computing, mobile
computing, E-commerce, net banking etc also needs high level of security. Since
these technologies hold
some important information regarding a person their security has become a must
thing. Enhancing cyber security and protecting critical information infrastructures
are essential to
each nation's security and economic wellbeing. Making the Internet safer (and
protecting Internet users) has become integral to the development of new services.

It is observed that out of total data breaches occurred in 2012 worldwide, 37% of
breaches are of financial organizations, 24% of breaches of retail environments and
restaurants,
20% of network intrusions involved manufacturing, transportation, and utilities,
and 20% of network intrusions hit information and professional services firms.
Cyber crooks performed these data breaches by using various tricks such as hacking,
stolen credentials, installing Malware, physically attacking the systems, etc. It
is reported
by the Verizon in their annual report of 2013, 52% of breachers occurred used some
form of hacking, 76% of network intrusions exploited weak or stolen credentials,
40% incorporated Malware, 35% involved physical attacks, 29% leveraged social
tactics and 13% resulted from privilege misuse and abuse.

Cyber crooks used various methods of attack to gain entry into the system network.
These are referred to as attack vectors. Figure 4 lists some of the more prevalent
attack
vectors, with the corresponding percentage of organizations that suffered from
them. Memory corruption, buffer overflow and DoS topped the list of most popular
attack vectors.
Traditionally, these security attacks and their risk is being classified into
worms, virus, botnets, spam, phishing, etc. Potts. Accordingly, security defenses
have been
developed as anti-virus, anti-spam, anti-phishing and many more. Now, attacks are
more advanced and sophisticated. So, it is more significant to think of attacks
in terms of the motivations behind them rather than classifying and defending
against them only based on the attack method. Better understating of motivation
behind various cyber
attacks, we can more clearly weigh their risks and determine which kinds of
defenses are required to protect our critical resources.

Some recent cases:

Microsoft exchange cyber attac(March 5, 2021)

Nidhi Razdan; Phishing attack victim (June, 2020)

Solar wind attack using SUNBURST Backdoor( Dec. ,2020)

WannaCry ransonware ( global epidemic, May 2017)

How to mitigate cyber threats:

Every organization has to protect all data and prepare for the worst and they need
to put an Incident Response plan in place, using;

Secure buy in from senior leadership, Continuous employee education, monitor


network traffic for suspicious activity, upgrade and patch software immediately and
promptly,
implement robust endpoint security, upgrade authentication inside and out, harden
external facing web applications, know where sensitive data resides, develop and
implement,
implememt rigorous application development testing and code reviews, perform
annual penetration assessments, and prepare for the worst case scenario

Measures to mitigate these threats vary, but security basics stay the same: Keep
the systems and anti-virus databases up to date, train your employees, configure
the firewall
to whitelist only the specific ports and hosts needed, keep the passwords strong,
use a least-privilege model in the IT environment, make regular backups, and
continuously audit
the IT systems for suspicious activity.
conclusion:

Privacy and security of the data will always be top security measures that any
organization takes care. We are presently living in a world where all the
information is maintained in a
digital or a cyber form. Social networking sites provide a space where users feel
safe as they interact with friends and family. In the case ofhome users, cyber-
criminals would continue
to target social media sites to steal personal data. Not only social networking but
also during bank transactions a person must take all the required security
measures.

Computer security is becoming more important because the world is becoming highly
interconnected, with networks being used to carry out critical transactions.
Cyber crime continues to diverge down different paths with each New Year that
passes and so does the security of the information. The latest and disruptive
technologies,
along with the new cyber tools and threats that come to light each day, are
challenging organizations with not only how they secure their infrastructure, but
how
they require new platforms and intelligence to do so. There is no perfect solution
for cyber crimes but we should try our level best to minimize them in order to have
a safe and
secure future in cyber space.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy