IT Security Plan to Prevent Cyber-Attacks Research Paper

Pages: 5 (1499 words)  ·  Bibliography Sources: 6  ·  File: .docx  ·  Level: Master's  ·  Topic: Information Technology  ·  Written: January 31, 2019

Therefore, there should be monitoring being done on the internal network to ensure that no attacks originate from within the network. All network traffic should be routed through a firewall to ensure that internal attacks are discovered early and they can be slowed down. When there is a malfunction of the network there should be redundancy in place to ensure that employees will still be able to access the network. The organization needs to look into the cause of the fault and have it rectified as soon as possible. There should be a separation between the internal and external network to ensure that employees are still able to perform their work even when the external network is down.

Protecting the Network and Assets

Get full Download Microsoft Word File access
for only $8.97.
There should be a comprehensive view of the network that can be used by security teams to view the hosts in the network, configurations, classifications, and other vital information. This allows the security team to view how data will move from one point to another on the network. The diagram also offers information on any missing hosts, access control, and many more. There should be attack simulations to allow the organization to understand the level of risk that might fall on the organization. A simulation will look at the whole network and it will offer information on what would happen if an attack was to occur. The simulation can also offer information on how the attack can be blocked to reduce its severity. This would also offer information on the vulnerabilities that pose the most risk to the organization. Having understood the nature and vulnerable points of the organization, then measures can be taken to address this and fix the vulnerabilities before an attacker is able to use them (Akhunzada et al., 2015). The organization will create an awareness program that is aimed at alerting the employee on the need to protect their equipment, personal information, and data. This ensures that the employees are alert at all times and they can safeguard against attacks that generate from within the organization. Detection systems should be in place to monitor both external and internal network traffic. This way any undesired intrusion is discovered early and can be mitigated against before it becomes critical.

Research Paper on IT Security Plan to Prevent Cyber-Attacks Assignment

In the case of a security breach, the first step would be to identify the affected hosts and put them offline. The source should also be determined to establish how the breach was initiated. The affected host will then be analyzed with an aim of fixing the breach and ensuring that the vulnerability and attack have been completely prevented. Before the devices are brought back online, they should be monitored to ensure that there are no more traces of the attack left behind. When the network is down, the first step is to check on the security protocols to be certain that it is not an attack or a DDoS attack (Davis, Wong, & Paterson, 2015). This will allow the organization to focus on fixing the issue with the network. The next step is establishing where the fault might have originated from either internally or externally. Once the fault is established there should be communication sent to the employees informing them of the fault and the estimated timelines for fixing the issue. During this time network activities should be limited to guard against any loss of data during transit. Finally, a plan should be created to restore the network and ensure that a similar issue does not affect the network again.

  1. Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), 65-88.
  2. Akhunzada, A., Sookhak, M., Anuar, N. B., Gani, A., Ahmed, E., Shiraz, M., . . . Khan, M. K. (2015). Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. Journal of Network and Computer Applications, 48, 44-57.
  3. Davis, T. A., Wong, M. L.-M., & Paterson, N. M. (2015). The Data Security Governance Conundrum: Practical Solutions and Best Practices for the Boardroom and the C-Suite. Colum. Bus. L. Rev., 613.
  4. Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80.
  5. Rice, L., & Rahman, S. (2015). Non-profit Organizations' Need to Address Security for Effective Government Contacting. arXiv preprint arXiv:1512.00067.
  6. Zhao, W., &… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (5 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Security Software Business Plan Capstone Project

Security Issues of Online Communities Term Paper

Information Technology (IT) Risk Management Cyber Crime Research Paper

System Security Thesis

Computer Security Research Paper

View 200+ other related papers  >>

How to Cite "IT Security Plan to Prevent Cyber-Attacks" Research Paper in a Bibliography:

APA Style

IT Security Plan to Prevent Cyber-Attacks.  (2019, January 31).  Retrieved January 22, 2021, from

MLA Format

"IT Security Plan to Prevent Cyber-Attacks."  31 January 2019.  Web.  22 January 2021. <>.

Chicago Style

"IT Security Plan to Prevent Cyber-Attacks."  January 31, 2019.  Accessed January 22, 2021.