Securing the Enterprise Infrastructure with Cyber Security Techniques
Name

introduced to concepts and methods for securing Microsoft Windows networks. We will also discuss security principles associated with securing networking services, and wireless networks are also explored.
ABSTRACT
Today the information technology industry faces numerous challenges mainly due to the fast changing trend where internet resources and networking services are becoming prime targets for cyber criminals. This development is often blamed on the fact that conventional techniques are unable to protect internet resources and networking services from different attacks while cyber criminals are also devising new tactics beat the existing defense mechanisms [3]. This paper analysis different network security threats to understand how they occur and give recommendations on how to establish the right protection against such threats. Additionally, the paper has also looked at the future evolution of network security risks. Finally, the paper concludes that the existing cyber security threats against network securities can only be defended using a combination of security intelligence and user training.
Introduction
Today there is huge growth of the internet in regards to its resources and usage. Nearly all educational institutions, commercial organizations, individuals and governments are leveraging on the internet to provide essential services [3]. Most of these organizations are able to perform their operations through the internet and other related networks. For example, thanks to advances made on the internet and other related networks, today educational institutions are able to share their research findings and educational materials online which is a speedy method of propagating information [3]. Based on these facts, it is quite evident that the internet and other related networks should operate in an environment where they run smoothly which can be enhanced through enhancing integrity and confidentiality of sensitive information passing through them. Unfortunately, the presence of vulnerabilities and configuration errors offers malicious users an opportunity to undertake various attacks with the intention of disrupting an organization’s network and compromising the integrity of the confidential information passing over the internet. Cyber attacks use malicious software and codes to deliberately exploit these computer systems while interfering with the security of a given network [3]. This paper aims to analyze different network security threats and make recommendations on how to establish the right protection against such threats while also looking at the future evolution of network security risks
Security Threats and Future Trends
With the dependence of information based individuals and organizations increasing on a daily basis, cyber criminals are looking to take advantage of this development to steal sensitive information. However, majority of the popular software being used to safeguard modern networks contain some configuration errors and vulnerabilities means that cyber criminals are keen to exploit such loopholes. As such, intruders misuse internet resources by exploiting these vulnerabilities to launch influential attacks. For example, after the wide spread vulnerabilities and exposure that internet and network vendors underwent through in 2012, a research study established that more than 70% of the host within organizations weren’t using updated software versions [6]. This finding implies that these hosts were exposed to numerous vulnerabilities that hackers were keen to exploit. Additionally, the research findings established that nearly 44% of the hosts in most organizations weren’t running updated versions of the Microsoft Windows Service Packs [8]. These services packs have the latest security updates of the Microsoft windows operating system and failure to run an updated version normally increases its security risks.
Today cyber threats are no longer just threats but they have become a daily reality. With these threats growing daily, there is a need to understand them so that the principles of information security can be adhered to effectively [1]. These principles of information security involve aspects such as integrity, confidentiality and availability. Understanding the motivation of these cyber attacks can help us to clearly project the expected future trends of these cyber attacks.
To prevent any financial loss, limit brand damage and protect customers, an organization has to enhance its network security. With security breaching tactics and malware threats growing and evolving daily, it is no longer enough to just purchase various security tools as a strategy to preventing future attacks. Instead, we must think of the different types of attack based on the motive behind them as this will help network security experts determine the best tactics to use to prevent them [5]. In other words, there is a need to depart from thinking that we can use technologies that only block attacks just at the periphery or the using signatures is enough to detect malware and keep enhance security.
As earlier suggested, the information technology industry faces numerous challenges mainly due to the fast changing trend where internet resources and networking services are becoming prime targets for cyber criminals. This development is often blamed on the fact that conventional techniques are unable to protect internet resources and networking services from different attacks while cyber criminals are also devising new tactics beat the existing defense mechanism [3]s. Based on these facts cyber threats are no longer just threats but they have become a daily reality and there is need to think of the different types of attack based on the motive behind them as this will help network security experts determine the best tactics to use to prevent them.
Recommendations
As established in this study, the presence of vulnerabilities and configuration errors offers malicious users an opportunity to undertake various attacks with the intention of disrupting an organization’s network and compromising the integrity of the confidential information passing over the internet [4]. As such, to avoid growing data loses as a result of insider attacks; it would be recommendable to establish a corporate policy that is automated since it will be able to catch most security incidents before attacks can cause serious harm on an organization. This solution would involve using a Data Loss Prevention mechanism since it has wide capabilities that can present organizations with numerous deployment options [4]. However, before deploying this DLP solution, the organizations will have to come up with a clear strategy that has concrete requirements.
There is need to care for users and their security policy. This recommendation requires that any security policy put in place to address these challenges has to be defined clearly to prevent any future cyber attacks [7]. Additionally, this policy has to stipulate clearly the different techniques that can be used to enhance this network security. This finding implies that these hosts were exposed to numerous vulnerabilities that hackers were keen to exploit.
Finally, security developers must strive to keep up with the evolution of the threats. As proposed, measures such as the development of an effective security policy, installation of anti-malware products, updating antivirus software, educating employees in organization and the enforcement of the security policies will be critical in securing the Microsoft Windows networks. Having these measures in place will ensure that Microsoft Windows networks are well protected using a dynamic approach that is responsive to the changing cyber security threats landscape.
Conclusion
Today, a huge number of organizational networks run on windows operating systems. With the increasing number of threats emanating from hackers and other loopholes, it would only be logical to ensure that secure security measures are implemented to secure Microsoft Windows networks. Across the globe, there are all indications that the number of threats will continue to grow. Therefore, security developers must strive to keep up with the evolution of the threats. As proposed, measures such as the development of an effective security policy, installation of anti-malware products, updating antivirus software, educating employees in organization and the enforcement of the security policies will be critical in securing the Microsoft Windows networks. Despite the challenges, Windows Operating systems continues to be an important host to various network systems and organizations. Effective implementation of the proposed methods will play a critical role in securing the networks.
References
[1]. I. Alsmadi, “Cyber Defense Analysis and Support,” The NICE Cyber Security Framework, pp. 53–73, 2019.
[2]. J. Conrad, “Seeking help: the important role of ethical hackers,” Network Security, vol. 2012, no. 8, pp. 5–8, 2012.
[3]. G. Kumar and K. Kumar, “Network security – an updated perspective,” Systems Science & Control Engineering, vol. 2, no. 1, pp. 325–334, 2014.
[4]. D. Lalitha, D. .Kamaraj, and M. Devan, “Anomaly Detection Techniques And Challenges On Big Data,” International Journal of Latest Trends in Engineering and Technology, vol. 9, no. 3, 2018.
[5]. A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007.
[6]. Verizon, “The 2012 data breach investigations report.,” www.verizonbusiness.com/ resources/reports/rp_2010-data-breach-report_en_xg.pdf, 2013. .
[7]. N. Virvilis and D. Gritzalis, “The Big Four – What We Did Wrong in Advanced Persistent Threat Detection?,” 2013 International Conference on Availability, Reliability and Security, 2013.
[8]. B. R. Yadav, B. S. Narayana, and D. Vasumati, “An Efficient Classifier approaches for Feature Reduction in Intrusion Detection,” International Journal of Computer Trends and Technology, vol. 26, no. 1, pp. 37–44, 2015.

Published by
Essays
View all posts