Based on Hulme (2004) article, many companies are now using firewalls, antivirus software and intrusion detection systems, but hackers and worms still break through business systems and cause serious damage. Lately it seems that more and more prevention and protection is required. Based on the article, attacks such as Blaster, MyDoom, and Witty cost businesses more than ten billion dollars a year. There is a need for more intelligent shields to ward off new attacks as they happen, instead of relying on signatures. Intrusion-prevention systems are what companies need to protect vulnerable computers and stop unforeseen attack methods (Hulme, 2004). The only way to make sure of protection before an attack is to integrate security technology and policies with regular and effective backups of systems, and important data. Virus attacks are becoming more sophisticated and often combine several types of threats to maximize impact against organizations.
Companies are searching for new and better technologies to block threats. According to Michael Assante, “Intrusion-prevention systems have a learning capability, intelligent, and are better able to identify and stop attacks. Since attacks are happening too fast for reactive tools, having these engines would be important to a company. There are primarily two types of intrusion prevention system. Host based is one type, which protects systems such as servers, and personal computers. Network based is the second type, which protect traffic from attacks (Hulme, 2004). Intrusion prevention systems use chunks of code that protect against potential attacks aimed at known software vulnerabilities. Many intrusion prevention systems can learn normal application and network behavior to block bad activities, like a file trying to infect a system, or a worm getting through application vulnerability and launch a buffer-overflow (Hulme, 2004). In doing more research on attack prevention, I learned that blended threats are more complex and a single security technology is not sufficient enough to defend against attacks. Effective protection from blended threats requires a security solution that has a multiple layers of defense, and response mechanism. Creating a defense barrier that includes an antivirus, firewall, content filtering, vulnerability management, and intrusion detection measures will make systems difficult for intruders to access sensitive data. All parts of the network should be protected with a response in place to provide security at all levels. Creating backups is very important in a business. But companies are not verifying their recoverability. This can lead to false backup, when a company assumes their data is secured, then finding out after a virus attack, that the backups failed and data was lost. Test recoveries should be scheduled regularly to ensure backup procedures are working like they should.
As threats quickly revolve and become more complex, managing these threats can become a great challenge for businesses. Companies need to have a good security policy in place; especially in employees are connected to an internal network with attached servers containing programs or important data. Once a virus gets through a security defense, it can quickly go through the system, destroying files, corrupting data, and make applications useless. Using a multiple layer of security, such as, running antivirus software, keeping virus definitions up-to-date, and enforcing regular backup schedules, can prevent attacks. Prevention is always the best security policy.
References
Hulme, G. (2004, October 11). Security: Get Your Shields Up! InformationWeek. Cisco Systems. Retrieved on July 12, 2008, from http://www.developers.net/ciscoshowcase/view/1201
Office of Information Security. (2008, March 31). Prevention/Recovery: Best Practices. Retrieved on July 13, 2008, from http://www.infosec.uga.edu/service/bcp/best_practices.php
References: Hulme, G. (2004, October 11). Security: Get Your Shields Up! InformationWeek. Cisco Systems. Retrieved on July 12, 2008, from http://www.developers.net/ciscoshowcase/view/1201 Office of Information Security. (2008, March 31). Prevention/Recovery: Best Practices. Retrieved on July 13, 2008, from http://www.infosec.uga.edu/service/bcp/best_practices.php
You May Also Find These Documents Helpful
-
Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…
- 4134 Words
- 12 Pages
Better Essays -
This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…
- 801 Words
- 4 Pages
Good Essays -
Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…
- 598 Words
- 3 Pages
Good Essays -
In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…
- 890 Words
- 4 Pages
Better Essays -
In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…
- 633 Words
- 3 Pages
Satisfactory Essays -
Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 7 Integrity Maintain valid, uncorrupted, and accurate information.…
- 1232 Words
- 14 Pages
Satisfactory Essays -
Common security countermeasures typically found in an IT infrastructure Risk assessment approach to securing an IT infrastructure Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…
- 526 Words
- 5 Pages
Satisfactory Essays -
Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…
- 1878 Words
- 8 Pages
Powerful Essays -
The all-in-one computer security systems are effective in a way that it protects one’s computer from all the threats previously mentioned, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and notify the user of any threats are detected. These all-in-one security systems are automatically updated without the user having to worry whether or not they have the latest information. An included feature that the Norton 360 comes with that are beneficial for individual users is the identify protection that securely keeps login and personal information safe, “guards against…
- 465 Words
- 2 Pages
Satisfactory Essays -
Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…
- 1432 Words
- 5 Pages
Better Essays -
When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…
- 555 Words
- 3 Pages
Good Essays -
Web Application Attacks Prevention advantage is used to benefit a protective or preventative standard used for determining the dimensions, area, with response capabilities such as an application layer firewall over a solution that identifies vulnerabilities in an application that are mean-full.…
- 1988 Words
- 8 Pages
Better Essays -
McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…
- 3569 Words
- 15 Pages
Powerful Essays -
References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…
- 1455 Words
- 5 Pages
Powerful Essays -
Many organizations use the Internet and the Web technology to make their business more productive, efficient, and to cut cost. Developing a central information system or IS, is vital to organizing and storing information pertaining to all company processes. An IS will make the “six important business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; and survival” achievable. (Laudon & Laudon, 2011) “Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations.” (Laudon & Laudon, 2011) A firewall is important to have to make a security barrier that ensures that the information within the company’s information systems safe from hackers and access by outside sources. A system’s firewall is just one of many ways a company can ensure the safety of their private information.…
- 1139 Words
- 5 Pages
Better Essays