Your responses to other students must be more than a simple "Good job" or "I agree with your post". They must also not just be "Let me add to your post..." Instead, your responses to each other should

Discussion 1:

   The government and private organizations can reduce potential vulnerabilities to ensure that the organization's operations are not interrupted using the following strategies. The first strategy is the employees' training to help identify possible threats that might affect the system. The organizations can work with the manufactures to assist in developing patches that would help in detecting malware. The second strategy is having an account for all the devices within a system. The inventory of the accessories within a system or network helps control possible intrusion in all the accessories (Alsunbul, Le, Tan & Srinivasan, 2016). The last is developing a policy on how the information of the organization. One of the methods used by intruders to alter the firm's operations is getting access to the links to the system used by the organization. 

The management can also put measures that help in protecting the firm against intrusion attempts. The first step is developing a firewall that ensures that all the intrusions are prevented so that unauthorized individuals do not access the organization's information. The second step is installing malware detectors that send signals to the system managers. an organization can also install an intrusion detection system that helps prevent the possible introduction into the firm's policy.  

The management of a firm needs to have mechanisms of anticipating future threats to help in protecting the organization against any attacks. The first way to prepare for future threats is by delegating duty within the firm so that individuals are responsible for the safety of the system used by the organization. The second step is constant updating of the system to wipe out malware that might be in the order (Kumar & Venugopalan, 2017). The latter approach is the constant changing of passwords to ensure that access to the organization's system is limited to authorized individuals only. 

 

References

Alsunbul, S., Le, P., Tan, J., & Srinivasan, B. (2016, January). A network defense system for detecting and preventing potential hacking attempts. In 2016 International Conference on Information Networking (ICOIN) (pp. 449-454). IEEE.

Kumar, D. A., & Venugopalan, S. R. (2017). Intrusion detection systems: A review. International Journal of Advanced Research in Computer Science8(8).

 

 

Discussion 2:

The Government and private sectors cyber issues are high in rate, after reading some articles and doing some research I came up with measures/precautions that should be incorporated by private organizations and governments for the better future which will stand against threats and decreases the vulnerabilities in the current system, the main motto should be making the system stable by decreasing the vulnerabilities with the prevention of intrusion in the systems as follows:

  • Any organizations or institutions should update and upgrade their software’s on time and  know about all the inventory which is present in the system from which anyone will know how the attacker try to attack the system, later we will know system issues and try to fix/reduce them so that the system will be secured (Amoroso, 2012).

  • Everyone should apply the security patches to their application and the software which public uses should be in up to date, needed security should be installed. This can reduce the risk of attack which might take place (Kurchina,2018).

  • One should always monitor changes and malicious intent which will occur in the system. All the employees and the people who develop the system should develop the system in such a way that it shouldn’t cause harm in the future.

  • Everyone should take an initiative to monitor configurations and system settings. Two factor authentications, identity verification, OTP’s sent to mobile phones is much needed to access the sensitive data (Kurchina,2018).

  • One should be capable of detecting the harmful processes. Installation of antivirus in the systems should be must and should.

 

References


Cyberattacks-Protecting National Infrastructure by Edward G. Amoroso, 2012

The Five Most Common Cybersecurity Risks – And How To Fight Back by Paul Kurchina, 2018