StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Attack Prevention Article Evaluation - Essay Example

Cite this document
Summary
The User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element. There are several types of attacks on the User Domain that are…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Attack Prevention Article Evaluation
Read Text Preview

Extract of sample "Attack Prevention Article Evaluation"

The User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element. There are several types of attacks on the User Domain that are prevalent, as they can be quite successful against an uninformed or untrained employee. By implementing good company policies and ensuring that best practices against these attacks are used, an organization should be able to mitigate the risks found in the User Domain.

The whole focal point of User Domain is to ensure that segregation of duties is conducted in computer’s main frame. Before attempting to observe the issue, it is essential to understand the focal point of user domain itself. This is a huge focal point in managing security in IT networks. In essence, user domain is defined as set of objects that allow a user to have controls and permissions. In essence, user domains can overlap. Another element of user domains is the fact that is allows users to possess segregation of duties.

Segregation of duties allows users to have separate domains and grant permissions. User domains can range from simple user access accounts or it can be a specific domain such as sales, marketing, and managers. Unlike traditional firewalls that only guard the parameters of the traditional IT infrastructure, virtualization firewalls provide comprehensive security measures that monitor activity within clients. If one machine is to be attacked by a host, the other machine automatically copies data in almost dynamic time that the user is not aware of the situation.

Clearly, that is a huge benefit for organizations since it allows them to have a safety net in case of an attack. The Intrusion Detection System (IDS) is a critical precautionary tool that monitors the network through monitoring packets that are passed within users. The first and easiest application of virtualization for security purposes is known as application isolation. This is a huge component towards the security aspect because it allows IT managers to gain leverage over application stability and application allocation.

One of the worst vulnerabilities for user domains are insider attacks. Insider attacks occur. For instance, denial of service and spoofing are one the most common themes that occur. The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN technology since it utilizes the traditional TCP/IP in user domains.A huge problem with human engineering is avoiding SQL Ad hoc injections. The fourth element that important to address was to rectify the SQL ad hoc injections.

In essence, the intruder can easily get access to the SQL and execute queries to derive personal information. In any given website, sensitive information may be present such as password and usernames, which can lead to further information. The first remedy to this solution is to place this network in a private server that saves all the sensitive information. Moreover, it embeds hierarchy of database permissions that build a layer of security within SQL. For instance, if the user table would not succeed in running a query, it will only allow SELECT access command instead of update/delete.

This means that the intruder cannot modify the contents within the SQL.Lastly, this article talked about updating the OS to ensure that security risks are rectified.In order to ensure that vulnerabilities are addressed, certain elements need to be addressed. First and foremost, OS has to be updated in regards of software Vulnerability. Updating to the new OS ensures that the system is not outdated and seals doors for advanced intruders. Furthermore, an effective patch management process can close vulnerabilities before malicious users or worms have an opportunity to exploit them.

Works Cited10 security best practice guidelines for businesses | ZDNet. (n.d.). ZDNet. Retrieved April 20, 2014, from http://www.zdnet.com/10-security-best-practice-guidelines-for-businesses-7000012088/

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1640957-attack-prevention-article-evaluation
(Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 Words)
Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1640957-attack-prevention-article-evaluation.
“Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1640957-attack-prevention-article-evaluation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Attack Prevention Article Evaluation

Migraine Headaches Have a Genetic Basis

Migraines are episodic, with the frequency of the attacks varying from a year to a week, with one attack a month being the most common.... Headaches may be considered one of the most commonly prevalent disorders of the nervous system.... Headaches may be classified into: (1) Primary Headaches - migraines, tension-type headaches and cluster headaches; (2) Secondary Headaches - headaches attributed to physical trauma, intracranial disorders, substance use and infections; (3) Headaches due to nerve damages....
4 Pages (1000 words) Article

Applications of Environmental Valuation for Determining Costs

In a process of evaluation of the benefits of abatement, the first step is to estimate the effect of the emissions on the health, visibility, deterioration of materials and depletion of natural resources and damages to the natural environment.... Professionals and engineers in the area of environmental protection have made significant advancements in the matter of improving technologies on the prevention of abatement of emissions....
6 Pages (1500 words) Article

The Politics of Delinquency Prevention in America

The main objective of the article "The Politics of Delinquency prevention in America" is to explore the factors that contribute to rapid delinquency in the United States.... The politics of Delinquency prevention in America needs to be looked at from a different perspective.... General public/parents that are the beneficiaries and benefactors of delinquency prevention must be honest and committed in their vision and approach....
1 Pages (250 words) Article

Nuke Evacuation in Fukushima

As Japan faced the danger of a nuclear disaster in the wake of a dreadful earthquake and tsunami, several organizations and news agencies monitored and gave impartial assessment of the state of affairs at Japan's nuclear facilities.... … As Japan faced the danger of a nuclear disaster in the wake of a dreadful earthquake and tsunami, several organizations and news agencies monitored and gave impartial assessment of the state of affairs at Japan's nuclear facilities....
1 Pages (250 words) Article

Preventing Child Abuse as Challenge for the State Department of Social Services

billion and employing nearly about 6,000 employees, was involved in offering social services, such as prevention of child abuse to the citizens of the state.... The State Department of Social Services have been playing a pivotal role in offering varied social services to the populaces of Atlantic coast state for several years....
8 Pages (2000 words) Article

"Sony Pictures hacked by Russian blackhats, it now emerges

A company require prevention to defend against attacks on low focus and make the aimed Sony pictures attack The eventual events leading to Sony Pictures attack is a controversial issue that raises a few questions with relation to the security of the data and information available in each firm.... A company require prevention to defend against attacks on low focus and make the aimed attack difficult.... The eventual events leading to Sony Pictures attack is a controversial issue that raises a few questions with relation to the security of the data and information available in each firm....
1 Pages (250 words) Article

The Role of the Family in the Relapse Prevention around Youth

"The Role of the Family in the Relapse prevention around Youth" paper states that the proper upbringing is aimed to form a responsible, independent, and kind personality.... Parents should be interested in their child's surroundings and the indicators of addiction in order to avoid negative results....
7 Pages (1750 words) Article

The Exposure of Youth to Unwanted Sexual Material on the Internet

This paper offers a critical review of the interventions, and evaluation of some of the proposed interventions as well as the reasons for developing the need to conduct research on suitable interventions for the prevention or reduction of the exposure.... The extent of the prevention strategies necessary has led to a number of federal legislative pieces that aim at reducing this exposure, some of which were struck down by the courts....
5 Pages (1250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us