preview

The Importance Of Network Defense Strategies

Good Essays

Network Defense Strategies
Cyber threats have become more and more sophisticated, and have demonstrated that static security concepts are no longer adequate with today’s advanced and well-funded attackers. The increasing risk of espionage within the cyber domain has revealed that data is not protected. It has even become important for organizations to re-evaluate their methods in protecting their systems, and should urge the need for an additional ‘pre-emption’ phase for better prevention techniques, detection, and response (Fischer, 2014). There is not as much concern about the type of the security concept, but more about the policy in place that organizations choose to adopt in an effort to battle the threats. There is a gradual …show more content…

Conduct audits on the infrastructure too. Hacking (not auditing) by an organization using their own team, however, has developed as an entirely different, and possibly quite a debated approach (The Ponemon Institute, 2013). It is important to know that hackers do not behave like traditional auditors since they do not have foreseeable timeframes for their work. Hackers easily break rules and laws, and they spend a lot of time before launching their attacks against critical infrastructure (The Ponemon Institute, 2013).
Identity Management and Governance
A best practice solution is a comprehensive and continuous process to understand which users should have access to which resources, then validating that each user has the appropriate access entitlements on a regular basis (Keyser, 2012). Identity management and governance offer great solutions. Identity governance benefits including:
• Increased security through automating processes that meet the compliance audits by establishing cross-system identity security policies
• Reduction in identity management costs by updating the steps such as role discovery, privilege clean-up, and certification
• Improvement in time-to-value and devotion to policy quicker and deliver a consistent, precise role, and security foundation (Keyser, 2012).
The overall goal of every cyber-attack is to take sensitive information or cause major damage;

Get Access