assignment65
docx
keyboard_arrow_up
School
University of Colorado, Denver *
*We aren’t endorsed by this school
Course
531
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
1
Uploaded by naikk84
References
Baker, K. (2023, March 23). What is Cyber Threat Intelligence?.
Crowdstrike. https://www.crowdstrike.com/cybersecurity-101/threat-intelligence/
Gudipati, S. (2023, September 3).
Cyber resilience: 8 proactive steps for organizations.
Crowe. https://www.crowe.com/cybersecurity-watch/cyber-resilience-8-proactive-steps-for-
organizations
Piltzecker, T. & Posey, B. (2008). The Best Damn Windows Server 2008 Book Period (2nd ed.).
Sciencedirect. https://www.sciencedirect.com/science/article/abs/pii/B9781597492737000094
Schoenfield, B.S. E. (2015). Securing Systems.
Taylor & Francis. https://reader2.yuzu.com/books/9781482233988
Witts, J. (2023, March 28). The Top 5 Biggest Cyber Security Threats That Small Businesses Face and How
To Stop Them. Expertinsights. https://expertinsights.com/insights/the-top-5-biggest-cyber-
security-threats-that-small-businesses-face-and-how-to-stop-them/
Hi Vipul,
Thank you for your post. I agree that web authentication is one way of implementing network
restrictions to the applications. Certainly, multiple conditions can be implemented to make it more
secure with rigorous rules and validations. However, the use of a multi-layered approach will enhance
the overall security of the organization. Along with web authentication services, implementing IDPS and
increasing security awareness amongst employees can also help improve security. Also, following the
zero-trust model with defense in depth can help achieve a more secure environment.
Hi Bhuvaneswarreddy,
Thank you for your post. I agree with you that web-based authentication may serve the purpose of
restricting unauthorized users from accessing a resource based on one’s location or IP address. However,
as you rightly pointed out, it is not difficult to spoof one’s identity with the help of evolving technology.
In order to counter this, one must implement principles of defense in depth and not only rely on
network restrictions. Along with some of the methods you mentioned, I would like to add that IDPS and
employee awareness training can also aid in improving security standards.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help