Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of

7


Strategies, possible Threats, possible Threat Actors, and Infrastructure

Sarah Ray

CSU Global

Cybersecurity Capstone

Ofori Boateng

08/07/2022


Strategies, possible Threats, possible Threat Actors, and Infrastructure

Providing a safe and reliable network for a local company will fall under the purview of this project. The network will have a virtual private network, an intrusion detection and prevention system, and a firewall. Only specific kinds of traffic will be permitted via the firewall, while default settings will block all other forms of traffic. The configuration of the intrusion detection and prevention system will make it possible to identify and thwart assaults made against the network. Implementing the virtual private network (VPN) will ensure the network's connection to the internet is kept secret and secure (Aiello, 2021).

The first thing that needs to be done to build a secure network is understanding the dangers it will encounter. An attempt to render a computer or network inaccessible to its regular users is known as a denial of service attack (DoS). A denial of service assault, sometimes known as a DoS attack, is the most typical cyberattack. Injecting malicious code into a network or being infected by a virus or worm can all lead to a denial of service attack (Krzykowska-Piotrowska et al., 2021). A Man-in-the-Middle (MitM) attack is an additional form of danger. An attempt to intercept or manipulate communications that are taking place between two or more parties is referred to as a MitM attack. Attacks utilizing man-in-the-middle techniques can be brought about by either the installation of malicious software on a computer or by a hostile individual who possesses the ability to intercept communications.

The data stored on a network are the most valuable asset there is. Computers, servers, and other types of storage devices are all capable of storing data. Data can also be sent across networks, such as the internet, which connects computers worldwide (Gečienė-Janulionė, 2018). The next thing that needs to be done to build a secure network is to list the assets that require protection. The secrecy of communications, the integrity of communications, and the availability of services are three more assets that must be safeguarded.

Locating the weaknesses already present in the network is the third phase in establishing a secure network. The usage of weak passwords, improper configuration of equipment, and software defects are all potential causes of vulnerabilities. After a vulnerability is discovered, it is necessary to patch it or take other preventative measures. Vulnerabilities, threats, and assets can all contribute to the creation of risks. It is necessary to conduct a risk assessment to ascertain the probability of an event and its potential consequences. Identifying the threats currently present in the network is the fourth phase of building a secure network.

The implementation of security measures is the fifth phase in the process of establishing a secure network. A network's hazards can be mitigated by implementing various security mechanisms. A firewall is the most frequent and widespread form of security control. You can use a firewall to prevent all traffic from entering your network or restrict it to only specific categories of data (Maloletko, 2015). Access control lists, virtual private networks, and intrusion detection and prevention systems are some of the other forms of security measures.

The monitoring of the network is the sixth phase in the process of building a secure network. Monitoring the network's performance in addition to the network itself can be done with network monitoring software. Network monitoring can either be done manually or automatically through the software. Responding to events constitutes the seventh and last step in developing a secure network. Incidents can be brought on by either malicious attacks or technical difficulties with the network. When something terrible happens, it is critical to act quickly and take the necessary precautions to limit the harm.

Recovering from an incident constitutes the eighth step in developing a secure network. Rebuilding the network or retrieving data from backups are two options for performing a recovery after an incident. Preventing future events is the ninth phase of establishing a secure network. Patching vulnerabilities, putting security rules in place, and keeping an eye on the web are all effective ways to forestall the occurrence of future events. Establishing a secure network reaches its tenth and last stage when the network itself is documented. The network documentation can be utilized to assist in problem-solving and can also be used when making plans for the network's future growth.

Conclusion

Every company needs to prioritize maintaining a safe and secure network. Understanding the threats, determining the assets, resolving the vulnerabilities, evaluating the risks, putting in place security controls, monitoring the network, responding to incidents, recovering from incidents, preventing future incidents, and documenting the network are the steps involved in developing a secure network.



Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 1

Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 2

Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 3

Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 4

Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 5

Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 6

Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 7


Building the Knowledge Base This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of 8

References

Aiello, S. (2021). Human/Personnel Security Threats: When Employees Turn Insider Threat Actors. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3944220

Gečienė-Janulionė, I. (2018). The Consequences of Perceived (In)security and Possible Coping Strategies of Lithuanian People in the Context of External Military Threats. Journal On Baltic Security4(1), 5-14. https://doi.org/10.2478/jobs-2018-0003

Krzykowska-Piotrowska, K., Dudek, E., Siergiejczyk, M., Rosiński, A., & Wawrzyński, W. (2021). Is Secure Communication in the R2I (Robot-to-Infrastructure) Model Possible? Identification of Threats. Energies14(15), 4702. https://doi.org/10.3390/en14154702

Maloletko, A. (2015). New Possible Threat of Economic Safety of the Hospitality Industry of the Crimea. Contemporary Problems Of Social Work1(3), 98-101. https://doi.org/10.17922/2412-5466-2015-1-3-98-101