While many organizations are beginning to be alert to the cyber dangers postured by malware and phishing, physical safety mustn’t be deserted. Without suitable defense measures, the organization is left susceptible to physical hazards. Some physical threats include first theft of documents; offices are likely to have documents and papers lying around various places, from printer stations to desks (Schneier, 2015). Vital and sensitive papers and documents can probably be unaccounted for and land to the wrong persons. Even if these documents and paper are not taken from the place, a visitor might see the data that holds some sensitive business information. The second threat is tailgating; tailgating means when an unapproved individual tails an approved individual into a protected place.
Another threat is the threat caused by unaccounted visitors. Suppose the organization has no means of knowing who was on the organization premises at a particular time. In that case, it is very challenging for the organization to have excellent physical security. Unaccounted visitors create significant risk because they will not establish who was present if anything happens.
Physical Security Strategies
Data
Strategy 1- Using Rack-Mount Servers in the organization (Kralicek, 2016).
Strategy 2- Guard the portables such as laptops
Human Resources
Strategy 1- Perimeter Intrusion Detection Systems (PIDS)
Strategy 2- Security staff
Hardware
Strategy 1- CCTV
Strategy 2- access control
Network Security Strategies
Network Perimeter Strategy
Strengthen organizations network like a fortress; for the organization to sustain integrity, availability, and confidentiality of its network, it should implement a strategy referred to as defense-in-depth (Fink et al., 2017). Bolt it down with DMZ is another strategy that the organization can use. Demilitarized Zone in-network is a defense place that splits organizations trusted internet from untrusted internet.
External and internal network traffic security strategy
Network security tools
Policy Recommendation
Policy Recommendation 1- Information Security Policy
Policy Recommendation 2- Incident Response Policy
OS and Application Security Strategy
The word operating system security discusses the measures and practices that can guarantee the Confidentiality, Integrity, and Availability (CIA) of working systems. Operating system security guards the OS against various threats (Markettos, 2019). The most common threats and vulnerabilities associated with operating systems include malware; Malware is a short form for malicious software. Malware includes a variety of attack routes such as rootkits, Trojans, worms, and viruses. Malware is introduced into an operating system without the holder’s permission or masked as genuine software, targeting to destroy or corrupt data, compromise the device or steal data.
The second threat and vulnerability linked with the operating system are Denial of Service Attacks (DoS) (Bonguet & Bellaiche, 2017). A Denial of Service (DoS) attack is projected to block a system with counterfeit applications, so it turns out to be encumbered and finally stops attending genuine demands. In the count to devastating a system’s properties, other DoS attacks can lead to destruction to the essential structure. Anti-malware solutions include Anti-Spyware Software; anti-spyware software screens organizations’ computers for possible threats. There are numerous cheaper or free options available such as Bitdefender Internet Security and Malwarebytes.
The best intrusion detection system is SolarWinds Security Event Manager because it can log communications created by Windows PCs and communication by Unix, Linux, and Mac-OS (Chahal, Kharb & Choudhary, 2019). SolarWinds Security Event Manager is a great intrusion detection system that costs $4,585. Some control strategies best for protecting the organization’s Web-based structure are keeping the company’s software updated and applying a robust password strategy. Controls strategies that the company can implement for securing the company’s database structure include encoding stored documentations and backups and using a Web Application Firewall (WAF). Some steps that can be included in the company’s operating system security-hardening measures include auditing your current systems and removing unnecessary privileges and accounts.
References
Bonguet, A., & Bellaiche, M. (2017). A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing. Future Internet, 9(3), 43.
Chahal, D., Kharb, L., & Choudhary, D. (2019). Performance analytics of network monitoring tools. Int. J. Innov. Technol. Explore. Eng.(IJITEE), 8(8).
Fink, G. A., Edgar, T. W., Rice, T. R., MacDonald, D. G., & Crawford, C. E. (2017). Security and privacy in cyber-physical systems. In Cyber-physical systems (pp. 129-141). Academic Press.
Kralicek, E. (2016). Server Hardware Strategy. In The Accidental SysAdmin Handbook (pp. 109-119). Apress, Berkeley, CA.
Markettos, T., Rothwell, C., Gutstein, B. F., Pearce, A., Neumann, P. G., Moore, S., & Watson, R. (2019). Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals.
Schneier, B. (2015). Secrets and lies: digital security in a networked world. John Wiley & Sons.