Watch the following video on the future of network security: https://www.youtube.com/watch?v=U7UBQ4-2MR4 Create a list of your top 10 security considerations, challenges, or goals for securing computers and networks in 2020. Original post- 350 words Respond to two classmates with 150 words each resposne. Response#1(Derek) Here is a list of my top 10 security considerations, challenges, and goals that should be addressed presently: 1) Software/APPs/hardware are not developed with security in mind. And, theyre rushed onto the market before understanding many of the vulnerabilities. It has become a hodge-podge of security patches and fixes after the fact, which takes away significant time and resources from a security professionals daily tasks. 2) One consideration should be to design security into the software/APP/hardware using the systems design approach, so security is baked-in. 3) As more devices connect to the internet, more targets with vulnerabilities exist. This includes the Internet of Things and Cloud computing. As the IoT explodes and 5G comes online en masse, the problem of securing these devices will be a major challenge for security practitioners. 4) Mobile devices should consider implementing encryption for all uses. Encryption for communications and hard drive encryption for data should be a standard practice. 5) Utilize machine learning for security analytics to better determine patterns and trends in cyber threats is an approach that can highlight where precious resources should be focused. 6) Better education for consumers is a challenge, as most people are passive and believe it wont happen to me. Organizations of all types must do their part to improve cyber security awareness, rather than relying on the government to be the consumer advocate, especially for the IoT. 7) Sharing of cyber threat intelligence would benefit organizations of all sizes, so they can mitigate vulnerabilities once they are discovered. If vulnerabilities are known to a few, but unknown to the rest because of poor information sharing, then the security is not functioning as it should be. Consider this: If you knew a bank was going to be robbed, but you didnt know exactly which bank, but failed to notify all of the banks in the area so they could take precautions, have you improve security? 8) Since IPv6 comes with IPSec capabilities, thus allowing for secure VPN communications, this feature should be utilized at every opportunity. This security feature is slowly making its way into newer systems, as IPv4 is slowly being replaced. 9) Self-* technologies should be further investigated and adopted as a means to mitigate information security risks. While machine learning is still in its infancy, significant improvements in what it can accomplish have been well-documented. The future of IT security belongs to artificial intelligence to combat threats and cyber risks associated with the IoT. Eliminating the human factor has shown to improve security efforts in both technology-based risks and physical security. 10) IT security professionals should be better aware of the APT from nation states and cyber terrorism. Those involved in SCADA-related systems are on the frontline of defending against such threats to critical infrastructure. However, nation states and cyber terrorists seek to use weapons of mass disruption through cyber space to attack targets of all sizes, big and small. They have no problem attacking a small business or non-profit organizations, for example, that may be aiding their enemy or simply attack because of differing political view points. Hacktivism from groups such as Anonymous are on the rise. In the past, attacks from organizations such as PETA and other left and right wing extremist groups have occurred on the streets. Now the attacks are occurring in cyber space more frequently. At the same time, cyber criminals, who have little fear of being caught, have increased their presence online, as the trend toward online crime continues to rise exponentially. Therefore, regardless of the size of an organization, if an opportunity to attack presents itself, there will be someone there to exploit any vulnerability discovered. IT security professionals should be aware that not every attack is motivated by money or thrill, but may be to seek revenge or send a political message to the masses. Response#2(Mulla) As the rate of security breaches continues to increase, so does the variety of attacks and the technologies and processes deployed to prevent them (Julie, 2017). Yet the top threats in the next few years will likely be from a type of hack known to security professionals today. Below are a few considerations to build stronger security: Team mindset: For security to become a priority, it helps to have an entire team that is invested in security. Standardization: IoT industry standardization is needed across the board much like the standards for browsers and websites in the early days of the Internet. Secure the supply chain: We must hold vendors accountable, but it’s not just about the device itself supply chain partners are numerous. Consumer education: If more people are educated on what could go wrong, they will be more security conscious. Secure applications that support IoT devices: We must ensure that the code and software we build for IoT is continually tested for vulnerabilities. 6. Multilayered network security: Many things can be done at the enterprise network level. Segmentation of networks can ensure that hacked IoT devices can’t affect other areas of networks (Stevens, 2018). Secure deployment. Many businesses depend on cloud-based application development lately, effectively transferring any platform-related security risks to the cloud vendor.
Future Of Security
Order a plagiarism free paper now. We do not use AI. Use the code SAVE15 to get a 15% Discount
Looking for help with your ASSIGNMENT? Our paper writing service can help you achieve higher grades and meet your deadlines.
Why order from us
We offer plagiarism-free content
We don’t use AI
Confidentiality is guaranteed
We guarantee A+ quality
We offer unlimited revisions