Perspective, resources and the future responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Threats targeting remote workers will increase, particularly if the work from home movement continues post-COVID. This in turn raises the threat against VPNs and cloud-based usage, such as overall misconfigurations, login/username/passwords issues, data retention and deletion concerns, etc. (StealthLabs, 2020).

Also, while not specifically network-focused, insider threats will potentially increase as well (which then takes advantage of network vulnerabilities). This includes unauthorized remote access (connecting unsecured mobile devices, for instance), utilizing misconfigured network weaknesses, and other vulnerabilities which lead to compromises and/or attacks (Hendry, 2021).

To remedy these two threats (and others), evolving technologies may be able to assist. For instance, artificial intelligence and machine learning can be used to analyze network traffic or user movements, and quickly alert security officials to anything unusual. Machine learning may also be able to proactively identify any threats prior to compromises even occurring (Brooks, 2020). Super computing or quantum computing will also eventually be used to better encrypt connections, files, etc. NIST is currently evaluating 65+ methods of post-quantum cryptography which may be used to secure systems in the future (Denning, 2019). On the flip slide, though, this technology can also be used by malicious actors to decrypt and attack systems.

Also, governance, risk and compliance (GRC) will help with all of these above, in that GRC outlines a way forward to protect systems from compromises. For instance, governance includes drafting policies and procedures to ensure data and network security. Risk is when an organization identifies specific threats and how to best remedy those vulnerabilities. And compliance works to ensure all users are adhering to the requirements implemented by the organization.

References

Brooks, C. (05 July 2020). Four Evolving Technology Areas of Smart Cybersecurity. Forbes. Retrieved 15 March 2021, from https://www.forbes.com/sites/chuckbrooks/2020/07/05/4-evolving-technology-areas-of-smart-cybersecurity/?sh=462b067f68fc

Denning, D. (2019). Is Quantum Computing a Cybersecurity Threat. American Scientist. Retrieved 15 March 2021, from https://www.americanscientist.org/article/is-quantum-computing-a-cybersecurity-threat

Hendry, J. (2021). Ex-Contractor Accessed Vic Govt IT System 260 Times a Year After Leaving. IT News. Retrieved 15 March 2021, from https://www.itnews.com.au/news/ex-contractor-accessed-vic-govt-it-system-260-times-a-year-after-leaving-562038

StealthLabs (2020). Cybersecurity Trends in 2021 and Beyond. StealthLabs. Retrieved 15 March 2021, from https://www.stealthlabs.com/blog/top-10-cybersecurity-trends-in-2021-and-beyond/

-GRETCHEN

RESPONSE 2:

1. List your thoughts on what the future holds for network security threats (what they are, will they increase, decline, etc.).

Bigger and better Malware and botnets that attack in more sophisticated ways. Starting in the “Cloud” as businesses increasingly rely on various cloud services for managing their customer data, internal project plans and financial assets, we expect to see an emergence of attacks targeting endpoints, mobile devices and credentials as means to gaining access to corporate or personal clouds. It’s hard to predict what form future attacks will take – but we can imagine ransomware taking hostage not just your local documents, but any type of cloud-hosted data. These attacks may not require data encryption and could take the form of blackmail – threats of going public with your confidential data. Strong password and cloud data access policies are more important than ever, your security is only as good as your weakest point!

2. List any evolving technologies (new) that you are aware of that can help with the threats you listed.

The next generation of firewalls is a hardware or software-based network security system that is able to detect and block sophisticated attacks by enforcing security policies at the application level, as well as at the port and protocol level. Next-generation firewalls integrate three key assets: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control. Like the introduction of stateful inspection in first-generation firewalls, NGFWs bring additional context to the firewall’s decision-making process by providing it with the ability to understand the details of the Web application traffic passing through it and taking action to block traffic that might exploit vulnerabilities. This is the single best example of what is evolving for network security a more intuitive firewall that has multi-levels of protection.

3. Explain how Governance, Risk and Compliance (GRC) will help with these matters, what part will they play (Chapter 15).

GCR when broken down its part plays an effective role in helpin shore up your network security. Governance makes sure that everyone from admins to users is following the security policy rules. Compliance makes sure your company is following all laws that apply to your business’s network, and finally Risk management. One of the foundations of any information security programs is a robust risk management practice. If you don’t identify your risks, how do you know which security technologies to deploy and where. All these put together create an equilibrium that keeps the network in good order.

Reference:

Steward, James M. Network Security Firewalls and VPNs. Sudbury, MA: Jones & Bartlett Learning, 2011. Print.

– MARIAH

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency