CYB 250 5-3 Final Project Milestone David Obi
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
250
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by JusticeRain3195
12/12/2023
Dave Obi
[COMPANY NAME]
CYB 250 5-3 Final Milestone
Cody Taylor
I.
Personnel or human factor trend
Human factors can lead to errors happening and this could be the first problem when it comes to securing an organization’s system. Humans are being used to creating a system and if they’re too lazy or not aware of any lacking components then the security system will not be up to par when dealing with any attacks. A trend that would benefit this company would be awareness. Establishing user awareness for both the cybersecurity team and the rest of the company’s employees would lessen or mitigate any possible attacks that could happen. The company is set to release a new smart headset that will more than likely have important documents stored within them. Each employee (technician) that is assigned with these new headsets should have a great sense of awareness of when and where they should use them. If these headsets are lost inside or outside of the organization’s main office, then they can fall into the wrong hands and more than likely will be exploited. User awareness can be taught by cyber security members and other instructors that the company could hire. I believe that would be a much-
needed event for the company to set up just to ensure its employees are aware of the horrors that their own actions could produce for themselves and the company. II.
Data protection strategy or technology trend
Employees and other company personnel will have to use Wi-Fi access to connect
their devices such as PCs, phones, and laptops. Having an unsecured Wi-Fi access
point could put the company at risk of being attacked by hackers that want to access the company’s data or employee information. Passwords, personal data, and financial information can be compromised by Man in the Middle attacks
performed by hackers. The best way to defend against these types of attacks would be to use Wi-Fi Protected Access 2 (WPA2). WPA2 was designed to use encryption technology to scramble data so it’s indecipherable to hackers. WPA2 uses what is a called an Advanced Encryption Standard (AES). AES used a
one key algorithm that encrypts and decrypts data. The data is not only going to become encrypted, but it will be put through several rounds of substitution, transposition, and mixing so that it is harder to decode and compromise. The main
risk with using WPA2 is allowing a device with a pre shared password to join the network. A hacker that is in use of that device could hack into the network traffic and could hijack connections and release their own content into the network traffic stream. Again, this is only an issue if a hacker has a skeleton key, or someone has given them access to the WPA2 Wi-Fi password. The encryption process will possibly slow internet speeds to a small degree and network devices (routers too) need to stay up to date security wise. Aside from those problems WPA2 completely wipes out the vulnerabilities of WEP to hacker attacks such as ‘man-in-the-middle’, authentication forging, replay, key collision, weak keys, packet forging, and ‘brute–force/dictionary’ attacks”. Technicians that will be in use of the headset while on the WPA2 network should also turn off their Bluetooth when their headset is not in use. Keeping the headsets connectivity on could leave it exposed to hackers that can intercept its Bluetooth connectivity and view the data and information stored within the devices. III.
System protection trend
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Endpoint detection and response tools (EDR) can be another great cyber security tool that the organization could use to identify and respond to external and internal threats. Every endpoint within the network’s infrastructure will be continuously monitored and this can range from employee laptops, desktops, mobile phones, and tablets. An intrusion detection system (IDS), application control tools, antivirus software, and firewalls will need to be installed to establish
this endpoint security protection for all the devices within the organizations walls.
The new Bluetooth headset will have a more safeguarded connection if these security tools are well established within the company. Cyber security team members will have greater visibility of the company’s network infrastructure as well as the traffic flow. This will allow them to fluidly monitor what is always going inside and outside of the network infrastructure.
REFERENCES:
Jr, R. S. (2022, December 30). Benefits of Endpoint Detection and Response (EDR) Services
. ClearNetwork, Inc. https://www.clearnetwork.com/benefits-of-
endpoint-detection-and-response-edr-services/
Komando, K. (n.d.). Leaving your phone’s Bluetooth on is a bigger risk than you think. Here’s what you need to know.
USA TODAY. Retrieved December 18, 2023, from https://www.usatoday.com/story/tech/columnist/komando/2023/02/26/leavi
ng-your-phones-bluetooth-24-7-can-major-security-risk/11308150002/
#:~:text=Hackers%20and%20scammers%20need%20to
Ghimiray, D. (2022, May 10). What Is WPA2 (Wireless Protected Access 2)?
What Is WPA2 (Wireless Protected Access 2)? https://www.avg.com/en/signal/what-
is-wpa2