CYB_250_FINALPROJECTMILESTONE_SABRINA_WYMAN
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
250
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by ProfessorOxideSnake114
Wyman 1
Final Project Milestone: Cyber Defense Paper Draft
CYB 250
Sabrina Wyman
When it comes down to the human factor it is always important to consider the different ways of setting up security. In our case we would need to make
Wyman 2
sure all employees are trained on properly protecting the headsets and the specific data the headsets have access to. Within the company this would also include their Bluetooth capabilities and server connections. In order to protect the companies’ data from the human factor, the employees must be trained on all basic and relevant security practices. Some of the ways the company can ensure the data is safe is by securing the
headsets properly so that they can not be stolen. When not in use a locked case would be the best option when it comes to ensuring the headsets are fully secured. Using a check in and out method would also help keep track of all headsets especially if they have electronic key cards so that no one is able to write down the wrong information as well as ensuring anyone that isn’t authorized to access the headsets does not get to them. Using a fingerprint scanner or a designated PIN could also be used in place of swipe cards to ensure only certain people can access them. When it comes to data of all kinds it is important to protect it as much as possible and Bluetooth devices make it even more difficult to protect as they are more vulnerable to attacks. A way to protect the devices virtually is by using a asymmetric encryption which can be done utilizing a VPN that is located on employee devices like their phones. Using a VPN will then encrypt
the data that is transmitted so that even if it is then intercepted it could be prevented as the attacker would not have the key to decrypt the data. Almost all major VPN providers there is something called hash that is built in in order to defend against an active attack. Having the VPN authentication in combination with the other recommendations could increase the security even more making it harder for an attacker to access the headsets through multiple layers.
Overall, the main goal is also to protect the systems endpoints. A endpoint refers to the protection of the ‘end’ of a network. These can refer to phones and any other form of device that can connect to a network or server. The main security used for endpoints would include firewalls and other monitoring tools. There should also be some rules and guidelines in place for the employees an example being that they should not be accessing company
data on their personal devices like their cell phones. Another important thing that should be used within the company is making sure all software connected to the company network has a antivirus software to help protect against invaders. EDR also known as endpoint detection and response will flag the different signs of malicious behavior which will help prevent other attacks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help