CYBERSECURITY 101 - Copy
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
505
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
7
Uploaded by MagistrateTurtle19767
Running Head: Cybersecurity
1
Cybersecurity
Tonnerrio Phillips
Grand Canyon University
Dr. Quieroz
CYB 505
August 9, 2023
Running Head: Cybersecurity
2
Cybersecurity
A digital diagram of a Castle
Gateway Router
Firewall
Antivirus
Data
IPS
Server
Backup
VPN
SIEM
DMZ
Multifactor
Authentication
Running Head: Cybersecurity
3
The arrangement and connections between the components above vary based on the
specific network structure and security requirements. However, here is a description of the
components. It is implemented in the enterprise to improve cybersecurity. The different
security devices are included in the diagram, like firewall, DMZ, Gateway, layer three
switches, etc., to ensure the security of the network of 1000+ clients, departments, VPN, and
isolated servers.
Gateway Router:
The vital hub for directing web traffic from the internal network.
Firewall:
A technological barrier designed to examine and enforce internet traffic
rules, securing the internal network against uninvited guests.
Antivirus:
Anti-malware tools developed to protect against digital attacks.
VPN:
Enables safe and convenient remote networking to the company's internal
network.
SIEM:
A centralized platform gathering and examining safety information from
diverse origins to identify and counteract potential risks.
Data Backup:
Backing up critical data regularly helps guarantee seamless recovery
following data loss or security incidents.
Server:
Hosts various services and applications, serving as the heart of the internal
network.
IPS:
By closely examining data transfers, these monitoring systems identify and
counteract dangerous cyber threats.
DMZ
: An isolation segment designated for external services disconnected from the
inner network.
Multifactor Authentication
: Adds an extra layer of security by requiring users to
provide multiple forms of authentication before granting access to the network or
applications.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Running Head: Cybersecurity
4
Before constructing a castle, architects must carefully consider how the project will
interact with its natural surroundings. Here are a few of these worries and detailed
descriptions of how they weaken the structure.
Identification:
Within this section, the company network puts a risk evaluation plan
into practice.
Protection:
The enterprise ensures the security of its network by granting access
solely to approved devices and blocking all attempts by unknown or recognized attackers.
The network has a firewall, DMZ, to protect from intrusion.
Detection:
Installing the IDS/IPS within the network enables it to identify and flag
suspicious activity.
Respond
: In this part of the framework, and the enterprise makes the response plan
by analysis and mitigation.
Recovery:
This includes communication and recovery planning to improve the
enterprise's situation.
Castle of Cybersecurity- Analyzing Safeguards and Online Security Approaches
Modern digital security employs multiple safeguards just as a castle had layers of
protection against invaders. Precisely like a castle stands guard to preserve its residents and
riches, a robust cybersecurity platform safeguards critical information and valuable assets
from digital attackers. We can dive deeper into this metaphor by examining the various
defense mechanisms within our digital stronghold and how they mirror both tangible and
technological protection components (Harris, 2019).
Outer Perimeter- The Gateway and Firewall
The mental image of the formidable castle defenses and secure entryway, barring
external risks. Within our digital stronghold, the gateway router and firewall are equivalent.
Running Head: Cybersecurity
5
The router acts as the entrance to the network, while the firewall resembles the alert security
personnel monitoring incoming and outgoing traffic.
Moat and Guards- Antivirus and VPN
According to the castle model, the moat and security personnel comprise the next
level of defense. Within our virtual stronghold, the antivirus program serves as watchful
sentinels, diligently monitoring for malevolent invaders. While this happens, the VPN takes
on the role of a secret passageway, shielding exchanges from unwanted observation.
Watchtowers and Signals- SIEM and Data Backup
The towering structures on the wall grant comprehensive visibility and prompt danger
detection. Within our digital stronghold, the SIEM technology monitors and analyzes security
events. This tool searches the virtual realm for any indications of danger, informing
protectors of impending risks. Like hidden reservoirs of resources, backup copies guarantee
access to crucial knowledge during emergencies.
Keep and Knights-Server and Intrusion Prevention
Deep within the castle walls lies the keep, the most robust stronghold. Our online
fortress houses the server, which plays this essential part. It houses the kingdom's valuable
treasures, equivalent to sensitive data. By replicating the role of knights in protecting the
keep, IPS guarantees digital security, preventing and eliminating unwanted incursions.
Bastions and Defensive Fortifications-DMZ and Multifactor Authentication
These bastions protect critical regions from direct assaults. The DMZ assumes a
comparable responsibility inside the digital borders of our cyber-kingdom. The structure
contains public-facing services, including the drawbridge, while separating them from the
secure heart of the network. Multifaceted verification methods serve as additional barriers,
granting restricted access only to legitimate parties.
Incorporating Physical Security Elements
Running Head: Cybersecurity
6
Every level of our cybersecurity system follows the protection methods employed in
actual castles. A robust defense system can deter adversaries, while advanced detection
technologies like SIEM and antivirus enable timely intervention. These delaying techniques
help defend against attacks by encrypting VPNs and providing extra time for response. The
systems are quick to react, warding off attacks with precision.
Applying Cyber Defense Methods, Tools and Components
The employment of a variety of cybersecurity tools and components is essential to
bolster our virtual castle. Akin to periodical fortress examinations, frequent safety evaluations
pinpoint susceptible areas. Updating security patches parallels reinforcing castle fortifications
against invaders. Security training and awareness educate the kingdom's inhabitants
(employees) on best practices, preventing unwitting breaches.
Furthermore, pre-emptive steps like penetration testing are comparable to simulating
mock attacks to detect weaknesses. These advanced systems operate similarly to the castle's
watchful sentries, monitoring for untoward actions. These plans serve as playbooks for
handling security crises, providing a roadmap to follow.
The castle representation elucidates the intricate protection mechanisms that secure
our virtual domain. Regarding the evolution of castle designs to accommodate changing
times, our security measures should also be dynamic (
Montgomery,
2017)
. Uncovering the
commonalities between medieval fortifications and cyber defense grants us enhanced
capacities to shield the cyber domain from pervasive cyber attacks. Multifaceted verification
methods serve as additional barriers, granting restricted access only to legitimate parties.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Running Head: Cybersecurity
7
References
Harris, J. J. (2019). Leveraging asymmetry and interdependence to enhance social
connectedness in cooperative digital games.
Montgomery, J. (2017).
The new wealth of cities: City dynamics and the fifth wave
.
Routledge.