assignment65

docx

School

University of Colorado, Denver *

*We aren’t endorsed by this school

Course

531

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by naikk84

Report
References Baker, K. (2023, March 23). What is Cyber Threat Intelligence?. Crowdstrike. https://www.crowdstrike.com/cybersecurity-101/threat-intelligence/ Gudipati, S. (2023, September 3). Cyber resilience: 8 proactive steps for organizations. Crowe. https://www.crowe.com/cybersecurity-watch/cyber-resilience-8-proactive-steps-for- organizations Piltzecker, T. & Posey, B. (2008). The Best Damn Windows Server 2008 Book Period (2nd ed.). Sciencedirect. https://www.sciencedirect.com/science/article/abs/pii/B9781597492737000094 Schoenfield, B.S. E. (2015). Securing Systems. Taylor & Francis. https://reader2.yuzu.com/books/9781482233988 Witts, J. (2023, March 28). The Top 5 Biggest Cyber Security Threats That Small Businesses Face and How To Stop Them. Expertinsights. https://expertinsights.com/insights/the-top-5-biggest-cyber- security-threats-that-small-businesses-face-and-how-to-stop-them/ Hi Vipul, Thank you for your post. I agree that web authentication is one way of implementing network restrictions to the applications. Certainly, multiple conditions can be implemented to make it more secure with rigorous rules and validations. However, the use of a multi-layered approach will enhance the overall security of the organization. Along with web authentication services, implementing IDPS and increasing security awareness amongst employees can also help improve security. Also, following the zero-trust model with defense in depth can help achieve a more secure environment. Hi Bhuvaneswarreddy, Thank you for your post. I agree with you that web-based authentication may serve the purpose of restricting unauthorized users from accessing a resource based on one’s location or IP address. However, as you rightly pointed out, it is not difficult to spoof one’s identity with the help of evolving technology. In order to counter this, one must implement principles of defense in depth and not only rely on network restrictions. Along with some of the methods you mentioned, I would like to add that IDPS and employee awareness training can also aid in improving security standards.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help