Name School In a networked organization, there are various kinds of threats that can affect the physical network. The attacks come in two forms; logical

Excerpt
, Deleted:s Inserted: d Inserted: , Inserted: , Deleted:g Inserted: o Deleted:o Inserted: o Inserted: h Deleted:o Inserted: , Inserted: d Inserted: o Deleted:s Deleted:s Deleted:c Inserted: s Deleted:to Inserted: t Deleted:r Inserted: , Inserted: – Inserted: the Inserted: the Inserted: , Deleted:about Inserted: is

Name School In a networked organization, there are various kinds of threats that can affect the physical network. The attacks come in two forms; logical and physical attacks. The physical attacks to a network can be in form of natural hazards and hardware threats such as theft, fire, electric fault etc. Logical attacks are mainly the use of a software to attack a network example include the logical bomb, viruses, psng, network sniffing and man in the middle. For example to mitigate the theft, the following can be employed by an organization; all the doors must remain closed with only authorized personnel to be allowed access, ensure electronic control to rooms, there should be security personnel to monitor the activities in the computer room.  In summary the hardware threats involves the physical damage of computer components such as the routers, switches and servers (Tipton & Tipton, 2012). Most of the physical threats have been outlined above, physical threats can be classified as follows; Humans cannot regulate the disasters that happen in the world. The disasters pose a big threat to property and security. The most common disasters include flood and fire. System failure can be as a result of poor components used in the servers and other systems. Ts can cause a failure and, therefore, a threat to the security of a system. Teves can come and steal the wh way with all the required data Terrorism attack can create a physical loss to the computers and data. The logical threat can be through network psng, the man in the middle, and many others detailed below. he two communication agents is that they communicate but in reality there is a person who might be altering the messages as they pass through the communication channel. A social engineering is using human weakness and trust to hack a network or technology protocols. Users generally trust each other and ts weakness can be described as psng.  Ts kind of attack can be prevented through training of the personnel on ts type of attacks and their remedy that can be employed in the attacks. An attacker can carry out a protocol analyzer to launch an attack. Ts is called packet sniffing. Using sniffing the attacker can gather a lot of information on the network such as un-encrypted network passwords, IP addresses using intelligent software that sniffs data. Ts packet analyzer can be placed using a trusted insider who can then use vulnerabilities to attack the network. and prevent any chance ts type of attack occurring. Ts kind of attack uses the port command to indirectly attack the target. Once inside the targeted network, the attacker can carry out the attack. Ts can be prevented by turning off file sharing features in windows. Some of the security controls that can be used to mitigate the physical measures have been ghlighted above. Though other measures that can be used in the control system include the following; The security procedures must be outlined in order to outline clearly what procedures are required for the organization to remain secure. The users must agree and sign a form in order to continue having access to the computers. The company Access to the Ensure that the only devices connected to the organization’s network are those items provided by the organization. Right from USB The hardening of the operating system should improve the ability of the attackers infeasible. There are various hardening techniques that can be employed and these are available from the National Institute of Standards and Technology and American Center for information technology. As the new virus definition come every day, the antivirus definition would continue in the same manner. All users should ensure their PC’s are up to date with the antivirus definition new viruses are discovered every day. To protect the PC further, the organization should monitor the antivirus logs in order to detect any failed update. Whenever a new person comes into the company, there should be a change control to implement the security control as well. Old passwords should be handed over to the new management and discarded. Host-based firewalls should run in all computers and laptops assigned to all employees. Apart from the host employees, the firewalls have hashed algorithms that identify applications such as Trojan Horse. Only encrypted emails should be sent from the server. Any sensitive data should have a proper email address Only official websites should be visited. Adult content should be restricted.  Employees should follow organization’s laid down procedures (ntzbergen, 2010). The probited should be clearly checked against the non-probited activities.  Password protect all devices; all devices should have password protection. Be it smartphone or laptop, all the devices will have to be password protected to avoid being used by untrusted people who might breach security measures. Sensitive data should be stored on encrypted drives. The drives should be encrypted or have a built-in encryption. The encrypted files will protect the data over the network . The following will need to be focused on; format hard drive and backup any data that may be required; rebuild the system from the ground-up, restore the system to the network and change all administrative passwords of the infected files.  Once an operating system is in place, apply the necessary security patches and see if any macne could be having a problem, as a result, change the network passwords and notify other security teams on the occurrence. The following can be used to prevent the occurrence of the logical risks; Implementation of the outbound application layer of the proxy servers prevents users from being directed to malicious sites (Roessing, 2010). Ts implements outbound web servers; as the only computer to connect to the outside networks. Filtering of email attachment ensures that only accepted files are attached to the emails. Ts will greatly reduce the chances of a computer program that might pose a threat to the computers in the network (Tipton, 2008). ed, there is a chance of an infection being found before the risk occurs. The following techniques can be employed in monitoring of the DNS server for malicious attack; Stefanek, 2002). ntzbergen, J., ntzbergen, K., & Smulders, A. (2010). . Zaltbommel: Van Haren Pub. Roessing, R. (2010). . Rolling Meadows, IL: ISACA. Stefanek, G. (2002). . Boston [Mass.]: Butterworth-Heinemann. Tipton, H. (2008). . Hoboken: Taylor & Francis Ltd. Tipton, H., & Tipton, H. (2012). . Boca Raton [u.a.]: CRC Press. Inserted:  the Inserted: , Inserted: , Inserted: o Deleted:o Inserted: the Inserted: is Deleted:be Inserted: , Deleted:s Inserted: d Inserted: , Inserted: , Deleted:g Inserted: o Deleted:o Inserted: o Inserted: h Deleted:o Inserted: , Inserted: d Inserted: o Deleted:s Deleted:s Deleted:c Inserted: s Deleted:to Inserted: t Deleted:r Inserted: , Inserted: – Inserted: the Inserted: the Inserted: , Deleted:about Inserted: is

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer