CYBERSECURITY 101 - Copy

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

505

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

7

Uploaded by MagistrateTurtle19767

Report
Running Head: Cybersecurity 1 Cybersecurity Tonnerrio Phillips Grand Canyon University Dr. Quieroz CYB 505 August 9, 2023
Running Head: Cybersecurity 2 Cybersecurity A digital diagram of a Castle Gateway Router Firewall Antivirus Data IPS Server Backup VPN SIEM DMZ Multifactor Authentication
Running Head: Cybersecurity 3 The arrangement and connections between the components above vary based on the specific network structure and security requirements. However, here is a description of the components. It is implemented in the enterprise to improve cybersecurity. The different security devices are included in the diagram, like firewall, DMZ, Gateway, layer three switches, etc., to ensure the security of the network of 1000+ clients, departments, VPN, and isolated servers. Gateway Router: The vital hub for directing web traffic from the internal network. Firewall: A technological barrier designed to examine and enforce internet traffic rules, securing the internal network against uninvited guests. Antivirus: Anti-malware tools developed to protect against digital attacks. VPN: Enables safe and convenient remote networking to the company's internal network. SIEM: A centralized platform gathering and examining safety information from diverse origins to identify and counteract potential risks. Data Backup: Backing up critical data regularly helps guarantee seamless recovery following data loss or security incidents. Server: Hosts various services and applications, serving as the heart of the internal network. IPS: By closely examining data transfers, these monitoring systems identify and counteract dangerous cyber threats. DMZ : An isolation segment designated for external services disconnected from the inner network. Multifactor Authentication : Adds an extra layer of security by requiring users to provide multiple forms of authentication before granting access to the network or applications.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Running Head: Cybersecurity 4 Before constructing a castle, architects must carefully consider how the project will interact with its natural surroundings. Here are a few of these worries and detailed descriptions of how they weaken the structure. Identification: Within this section, the company network puts a risk evaluation plan into practice. Protection: The enterprise ensures the security of its network by granting access solely to approved devices and blocking all attempts by unknown or recognized attackers. The network has a firewall, DMZ, to protect from intrusion. Detection: Installing the IDS/IPS within the network enables it to identify and flag suspicious activity. Respond : In this part of the framework, and the enterprise makes the response plan by analysis and mitigation. Recovery: This includes communication and recovery planning to improve the enterprise's situation. Castle of Cybersecurity- Analyzing Safeguards and Online Security Approaches Modern digital security employs multiple safeguards just as a castle had layers of protection against invaders. Precisely like a castle stands guard to preserve its residents and riches, a robust cybersecurity platform safeguards critical information and valuable assets from digital attackers. We can dive deeper into this metaphor by examining the various defense mechanisms within our digital stronghold and how they mirror both tangible and technological protection components (Harris, 2019). Outer Perimeter- The Gateway and Firewall The mental image of the formidable castle defenses and secure entryway, barring external risks. Within our digital stronghold, the gateway router and firewall are equivalent.
Running Head: Cybersecurity 5 The router acts as the entrance to the network, while the firewall resembles the alert security personnel monitoring incoming and outgoing traffic. Moat and Guards- Antivirus and VPN According to the castle model, the moat and security personnel comprise the next level of defense. Within our virtual stronghold, the antivirus program serves as watchful sentinels, diligently monitoring for malevolent invaders. While this happens, the VPN takes on the role of a secret passageway, shielding exchanges from unwanted observation. Watchtowers and Signals- SIEM and Data Backup The towering structures on the wall grant comprehensive visibility and prompt danger detection. Within our digital stronghold, the SIEM technology monitors and analyzes security events. This tool searches the virtual realm for any indications of danger, informing protectors of impending risks. Like hidden reservoirs of resources, backup copies guarantee access to crucial knowledge during emergencies. Keep and Knights-Server and Intrusion Prevention Deep within the castle walls lies the keep, the most robust stronghold. Our online fortress houses the server, which plays this essential part. It houses the kingdom's valuable treasures, equivalent to sensitive data. By replicating the role of knights in protecting the keep, IPS guarantees digital security, preventing and eliminating unwanted incursions. Bastions and Defensive Fortifications-DMZ and Multifactor Authentication These bastions protect critical regions from direct assaults. The DMZ assumes a comparable responsibility inside the digital borders of our cyber-kingdom. The structure contains public-facing services, including the drawbridge, while separating them from the secure heart of the network. Multifaceted verification methods serve as additional barriers, granting restricted access only to legitimate parties. Incorporating Physical Security Elements
Running Head: Cybersecurity 6 Every level of our cybersecurity system follows the protection methods employed in actual castles. A robust defense system can deter adversaries, while advanced detection technologies like SIEM and antivirus enable timely intervention. These delaying techniques help defend against attacks by encrypting VPNs and providing extra time for response. The systems are quick to react, warding off attacks with precision. Applying Cyber Defense Methods, Tools and Components The employment of a variety of cybersecurity tools and components is essential to bolster our virtual castle. Akin to periodical fortress examinations, frequent safety evaluations pinpoint susceptible areas. Updating security patches parallels reinforcing castle fortifications against invaders. Security training and awareness educate the kingdom's inhabitants (employees) on best practices, preventing unwitting breaches. Furthermore, pre-emptive steps like penetration testing are comparable to simulating mock attacks to detect weaknesses. These advanced systems operate similarly to the castle's watchful sentries, monitoring for untoward actions. These plans serve as playbooks for handling security crises, providing a roadmap to follow. The castle representation elucidates the intricate protection mechanisms that secure our virtual domain. Regarding the evolution of castle designs to accommodate changing times, our security measures should also be dynamic ( Montgomery, 2017) . Uncovering the commonalities between medieval fortifications and cyber defense grants us enhanced capacities to shield the cyber domain from pervasive cyber attacks. Multifaceted verification methods serve as additional barriers, granting restricted access only to legitimate parties.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Running Head: Cybersecurity 7 References Harris, J. J. (2019). Leveraging asymmetry and interdependence to enhance social connectedness in cooperative digital games. Montgomery, J. (2017). The new wealth of cities: City dynamics and the fifth wave . Routledge.