This website uses cookies to ensure you have the best experience. Learn more

Attack Prevention Essay

611 words - 3 pages

Attack Prevention Paper- Internal Attacks
March 17, 2014

Attack Prevention Paper- Internal Attacks

It is no secret that companies spend a majority of their security budget on protecting they’re networks from attacks. Security monitoring is a major key to any successful company or organization. With so many attack vectors and vulnerabilities, management in most organizations has made security the number one priority. Security monitoring involves a wide array of functions, and while the routine security analyst may attribute the security breaches to external attacks, most breaches are internal, because of lack of training or end user negligence.

The first step in protecting a company’s assets from internal attacks is to identify and classify what those assets are. Where they are stored, how it is accessed, and who has access to it, and what controls are currently in place to protect it. The list of personnel should be ...view middle of the document...

Internal Penetration Testing examines the security of internally connected systems. Internal Penetration Testing involves finding known and unknown vulnerabilities from the view of the internal attacker.

Because they have knowledge of internal systems, policy, and server configurations, the internal attacker has the upper hand. It’s hard enough to keep external attackers out; but to keep internal users from gaining unauthorized access to certain areas of the system to gain information makes security that much harder. Intrusion Detection Systems (IDS) can be a valuable tool to prevent and detect insider attacks.

While the Intrusion Detection Systems (IDS), are designed to detect external threats. It can be configured to detect internal attacks as well. The Intrusion Detection System can detect when users access information that are not required for their specific job, as well as any other attacks.

The logging and reporting of attacks by the internal IDS systems can not only be used to detect attacks, but by combining the data from all IDS systems, attack patterns can be identified. Once attack patterns are identified, users who are a threat to security and have been showing unauthorized network behavior, or who are doing anything that is against company policy. Once these users have been identified, action can be taken to prevent intrusions.

Although insider attacks are a challenge for security administrators, they can be detected by various types of IDS systems. Understanding what an insider attack is and how it can happen will help to identify potential threats and how to best prepare defenses against them.

These articles discuss what many organizations face on a daily bases. Recent news events show how vulnerable our own government was to an internal threat. The Security breach at the NSA proves that our government and companies need to be more vigilant when it comes to internal attacks.


SANS Institute 2009,

CFO Publishing, LLC 2014,

Symantec, 2002, protection-antivirus

Other Essays Like Attack Prevention

Mcbride Financial Website Security Plan Essay

1074 words - 5 pages servers. In order to prevent this from occurring and limiting the damage done in the case of a successful attack McBride must implement a Prevention, Detection, and Recovery plan. Prevention A prevention plan for McBride will be need to include protection for the company servers and protection for client information. The first step in this plan is to establish a demilitarized zone (DMZ) to separate the web server from the company databases and

Type 2 Diabetes - Reducing The Risk

1333 words - 6 pages build up in the blood stream. Without intervention, this can have severe complications such as hypertension, heart attack or stroke, kidney disease, nervous system damage, eye problems and blindness, and pregnancy. Diabetes is the seventh leading cause of death within the United States. This growing trend is preventable by increasing awareness about the risk of diabetes and educating people on the importance of choosing a lifestyle consisting

Biological Warfare

802 words - 4 pages street following a biological attack. The images are intended to instill fear in the reader, as well as to provoke interest in the article.The author's purpose is clear: to warn, to elicit concern and to educate the public of the threat of a biological attack. The article succeeds in its intention by employing various scare tactics. It exemplifies the helplessness of Canadians regarding assault prevention, as well as outlining the lack of

Applications of Epidemiology-Case Study

1807 words - 8 pages patients seek admission for treatment. According to Center for Disease Control and prevention (CDC), and Pennsylvania Department of Health (PADOH), a healthcare associated infection (HAI) which is also known as nosocomial infection is an infection that a person gets while staying as a patient in a hospital or other health care facility (PADOH, 2008). Hence, it is clearly understood that patients always acquired nosocomial infections during the

President Bush 9/11 Address to the Nation

665 words - 3 pages attack of 9/11 the nation dove into research of the events that happened prior to and found that the hijackers have been apart of Osama Bin Laden’s terrorist organization and later found out that many of the hijackers had actually lived in the states for a couple of years. After the events took place of 9/11 President Bush went into full work mode in hopes of improving society and the prevention against having another disaster like 9/11 happening

The Health Effects of Smoking Cigarettes

938 words - 4 pages A small warning label is all that is stamped to each pack of cigarettes. This small label placed there by the cigarette manufactures is supposed to alert smokers to the health dangers of smoking. While all smokers know that this label exists, many choose to ignore it and take the risk on their health anyways. According to the National Center for Chronic Disease Prevention and Health Promotion, CDC, “Smoking is the primary causal

Information Technology White Paper

1186 words - 5 pages since if the event happen, the business operation cannot continue. Also, natural disaster such as hurricane and tornado must also taken into account and business must have backup server to continue business operation. As for dealing with DOS attack, it is required for business to install firewall and intrusion prevention system in order to detect route of DOS attack. It is important to keep business in operation in order to continue business

Network Security

1161 words - 5 pages dealing with DOS attack, it is required for business to install firewall and intrusion prevention system in order to detect route of DOS attack. It is important to keep business in operation in order to continue business goal and objective. In conclusion, business must have great awareness of IT security and try their best to protect their asset including data and information system. Following security guidelines and creating appropriate

Heart Disease

558 words - 3 pages Heart disease refers to the most common condition that affects the heart, which is coronary artery disease. When blood vessels that feed the heart become blocked, it causes coronary artery disease. People who have coronary artery disease will develop plaque inside the coronary arteries. This plaque will reduce the amount of blood flow to the heart, which will cause damage to the heart muscle. When a person suffers a heart attack, there is

Healthy Living

659 words - 3 pages can shave almost four years off the expected lifespan. High cholesterol can lead to the buildup of fatty deposits in the arteries, increasing the risk of heart disease and stroke. High blood pressure is often called the “silent killer” because it has no warning signs or symptoms yet keeping it under control can cut the risk of a stroke by 40 per cent and heart attack by up to 25 per cent. Dr. Yancy urged governments to invest in prevention

Rewriting the Past

1968 words - 8 pages feasibility of orchestrating an attack, due to the US government’s failure to pursue effective prevention strategies. Since the conditions seem to be so favorable, some have questioned why no such incident has occurred yet. However, considering the risks, the results of a nuclear attack would not most efficiently accomplish the goals of many terrorist organizations, which often strive for a large number of witnesses as opposed to deaths (Hoffman, 2006

Related Papers

Cmgt441 Week 3 Cyber Attacks Individual Paper

836 words - 4 pages automatic infiltration act. A hacker can hack for storage for keeping copyrighted material on the users system illegally (studentpulse). So in order to keep the attack prevention in order one must take the preventive measures to keep the system and network safe. Taking the steps mentioned in this paper will help keep the computer and network under lock and key but always remember as new applications and updates are available there is always an

Two Vulnerabilities In Qwd’s Network Design Pose A Threat To Qwd’s Future

1061 words - 5 pages behind a Juniper ISG2000 integrated Firewall, VPN, and Intrusion Detection and Prevention system such an attack can still make the corporate website and intranet vulnerable and expose the entire corporate network and proprietary assets. To extend this idea further, a QWD competitor could potentially engage on corporate espionage without us ever knowing. QWD could potentially lose competitive edge over its competitors. It can also tarnish QWD’s

Health Promotion Essay

2265 words - 10 pages ), communications via emails, and school websites or newsletters and activities with both individuals and groups of children and/or families (Croghan, E. 2011). Secondary level focuses on prevention of reoccurrence, detection and diagnosis of disease at an early stage to minimize effect and to stop its progression. For example individuals facing Transient Ischemic Attack or a first Cerebrovascular Accident (CVA) are at substantial danger of subsequent CVA. Risk

Crowdstrike Matewr Essay

559 words - 3 pages approaches only address the 40 percent of breaches that use malware They don’t enable proactive hunting to find and block adversary activity Most security tools only address part of the cyber ‘kill-chain’ When existing approaches fail, they provide no visibility, resulting in ‘silent failure’ IT’S TIME FOR A NEW APPROACH FALCON: THE BREACH PREVENTION PLATFORM Cloud Delivered NEXT-GEN AV EDR MANAGED HUNTING Continous Breach