Mitigating external cyber-attacks
William Dilly
Keller University SEC572
External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks. Since there is no 100% method to stop external cyber-attacks, attention to detail must be made in regards to proper configuration of the network to include state of the art hardware and software. To include current security patches for both software and hardware respectively. Additionally, hardware and software measures will be limited in their effectiveness without network policies and techniques to protect against external cyber-attacks such as Denial of Service, Distributed Denial of Service, Masquerading and IP Spoofing, Smurf Attacks, Land c Attacks, and Man-in-the-Middle attacks. In close coordination with our IS team engineers and IT network director an approved plan has been incorporated to minimize risk of an effective cyber-attack on our network. Specifically this plan covers a comprehensive review of current network design and interdependencies, Standard Operating Procedures, Emergency Operating Procedures, detailed analysis of every program, service, host, router, switch to include interaction between these services and resources.
Testing current system and policies by a certified third party security consultant on a not to interfere basis will provide invaluable insight on our network. Additionally, weekly
References: Cretzman and Weeks, M. A. T. (July). Best practices for preventing dos/denial of service attacks Retrieved from http://technet.microsoft.com/en-us/library/cc750213 Kaeo, M. (2004). Designing network security. (Second ed., p. 446). Indianapolis: Cisco Press. Wasik, D. (July). Five ways small businesses can combat cyber crime. Retrieved from http://startupnation.com/business-articles/9012/technology-cybercrime