Defensive tactics and procedures responses

All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Security is impacted by many factors including what type of network or system is being used, what systems will be connected to it or in communication with it and how available it should be to users amongst others. For all types of networks, it is vital to use the principle of defense in depth to secure it on all levels of the TCP/IP structure, and also, using legal regulations to apply policies that meet the criteria that is expected in general and for the specific industry you work in. Defense in depth is meant as not a strict use of certain security features but rather a term used to describe multiple layers of security for differing aspects of a system. These controls all work together to provide added layers of security so if a threat bypasses one security control, hopefully another one will catch it. Some of the mainstay controls that can be used are POLP or principle of least privilege, firewalls, port filtering, Intrusion prevention system, anti-virus/anti-malware, physical precautions, training for staff and auditing. These are all various ways to implement security but by far a comprehensive list. Even within this listing, there are a great number of details and security options that can be implemented. Having a policy and framework that specifies the controls that are to be used, lays out the network schematic and has a detailed Disaster Recovery Plan included is essential as well. These documents will help to know how to handle any situation, however they must be revisited and updated frequently. Audits and risk assessments will help these to remain up to date if they are revisited and updated with those occur.   

-AMANDA

Plus, P. C. (2009, September 12). How to secure your TCP/IP Ports. TechRadar. Retrieved January 3, 2022, from https://www.techradar.com/news/networking/how-to-secure-your-tcp-ip-ports-633089/2

Winterfeld, Steve, and Jason Andress. The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Elsevier Science & Technology Books, 2012. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/apus/detail.action?docID=1073026.

RESPONSE 2:

Security architecture consists of tools, techniques, and technologies that detect and prevent network penetration additionally, practicing cybersecurity countermeasures ensures the network will be hardened. It is good to have a digital footprint of the organization to gather information about the different devices within the organization before performing a penetration (pen) test (Levy, 2021). It would be a good idea to start with what security tools are in place such as firewalls, intrusion detection systems (IDS) and other devices are operating. A network map can be created that can identify things like networks, remote sites, routers, servers, and other important devices (Helpsystems, 2017).

Some countermeasures to preventing attacks are to check for things like thing Open-Source intelligence (OSINT) this could be from the corporate website, online forums, social media, and other online outlets. If these sites are releasing too much general information about the organization it could lead to a social engineering attack (Bisson, 2021). Another countermeasure that not all organizations think to do is securing their trash. This is important because if sensitive data or important data and documents are found in the trash a hacker can use that information or exploit it.

Another countermeasure is securing the network because a hacker could be wardriving around to look for unsecured networks to penetrate (Panda, 2020). With technology on the rise now drones are being sent to look for weak networks so implementing security cameras that can identify drones is a good idea. Physical barriers should be in place as well such as locked doors that require a badge. Another option is having a security guard who requires everyone who walks through the door to present their photo badge. These things can help secure and prevent cybersecurity breaches.

-ROBERTO

Bisson, D. (2021, September 14). 10 open-source intelligence tools (that actually work with your existing security software). Retrieved January 04, 2022, from https://securityintelligence.com/articles/10-open-source-intelligence-tools-existing-security-software/

Helpsystems. (2017, February 22). Network Mapping Best Practices: Four Steps for Success. Retrieved January 04, 2022, from https://www.helpsystems.com/resources/articles/network-mapping-best-practices-four-steps-success

Levy, E. (2021, June 02). What is a digital footprint? Retrieved January 04, 2022, from https://www.netsafe.org.nz/digital-footprint/

Panda. (2020, December 17). Wardriving: What is it + how can you detect it? Retrieved January 04, 2022, from https://www.pandasecurity.com/en/mediacenter/security/wardriving/







Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 10% with the coupon code: best10