Future Trends In Network Security Threats, Evolving Technologies Research Paper

Modern world is full of information technologies, which are developing at very high speed. Number of network security threats is also rapidly growing. Future trends of threats development are not encouraging. Network security is constantly amenable to attack of Rogue Devices, which provide an opportunity for unauthorized access to the corporate network, often bypassing corporate security mechanisms.

Vulnerability of networks is one of the future trends of network security threat. Some network devices may be more vulnerable than others, they may be incorrectly configured, use weak encryption keys or authentication methods with known vulnerabilities. Not surprisingly, they are attacked first. Analyst reports say that more than 70 percent of successful hacking of wireless networks occurred as a result of incorrect configuration of the access point or client software (Bhatia, & Shah, 2013).

Incorrectly configured access points are one more network security threat. A single access incorrectly configured point (including a stranger) can cause cracking of corporate network. The default settings of most access points include authentication or encryption, or use static keys stored in the user manual, and therefore are well-known.

There is also a trend in the development of network security threats, as hacking encryption, emergence of new threats and attacks, intelligence, impersonation and Identity Theft, Denial of Service (DoS), information leakage from a wired network, peculiarities of wireless networks, and others (Qaisar & Khawaja, 2012).

In parallel with the increasing of number of network security threats, technologies that may mitigate these threats also develop. Currently, IT departments have many available remedies from a wide range of ever-evolving threats to security of enterprise networks. Unfortunately, there is practically no consistency between the information security technologies such as firewalls, intrusion detection and intrusion prevention, device detection of network anomalies (NBAD), control system and timely installation of updates, VPN devices, etc. Uncoordinated approach to information security, along with a growing exponentially number of threats has led the emergence of chaotic process of reflection attacks.

Unfortunately, nowadays the process of reflection attacks can’t be called an organized and structured process. Invading the enterprise network, the attack is spreading rapidly and affects a lot of servers, desktops, laptops, and, ultimately, mobile end nodes. Large IT organizations send out warnings, determining attack signature, releasing hot fixes or updating to enterprise networks. IT departments spend the next few days for treatment systems in an attempt to recover the corporate network (Mr. Sachin Taluja1, 2012).

Level of network security of many modern enterprises is not high enough to withstand experienced hackers, malicious employees and cyber – criminals. Enterprise network security strategy against threats is a proactive approach to the problem of information security and allows IT staff to eliminate the threat in advance. Strategy Network Threat Protection is highly integrated and provides implementation of security features in the deep structure of the enterprise network. This strategy provides information security personnel to exercise control over the security devices to synchronize important information about threats and group devices if necessary.

It should be noted that market of information systems has lots of enterprise solutions of GRC class. At the same time, many experts see Governance, Risk management and Compliance as a way to manage information technology or information security. GRC is a look at managing anything from three perspectives: governance, risk management and compliance. Any activity can be decomposed into the three components (Anand, 2010).

Indeed, company first determines the objectives to achieve. Then it initiates some activities to achieve them. While the activity is carried out, they want to control it, having timely, objective and accurate information on its progress. This is the function of senior management (Governance) – specifying the goal and control of achievement.

Then company thinks up of risks that may be encountered on the way to the goal. Identified risks are handled and in the future, this procedure is periodically repeated. This function is of risk management.

In addition, planning and executing their activities, companies are concerned about compliance with a number of external and internal regulations. They are influenced by laws, industry standards and contractual obligations. Fulfillment of all these requirements is a function of compliance.

This view of management is implemented in IT systems of GRC class. Most of these systems are solutions for the collection and analysis of information on the implementation of activities from all divisions of the company. Information on projected risks and performance requirements of applicable laws, standards and internal regulations are provided to a top manager in the form of visual reports that demonstrate the problem areas. These systems provide detailed information necessary for the identification and treatment of risks and inconsistencies to line managers. Today, GRC concept is extremely relevant to the field of information security (Verschoor, 2012).

 

References:

Anand, S. (2010). Technology and the integration of governance, risk management and compliance. Financial Executive, 26(10), 57-58.

Bhatia, J., & Shah, B. (2013). Review on various security threats & solutions and network coding based security approach for vanet. International Journal of Advances in Engineering & Technology, 6(1), 361-362.

Mr. Sachin Taluja1, P. (2012). Survey on network security, threats & firewalls. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(7), 053-054.

Qaisar, S., & Khawaja, K. (2012). Cloud computing: Network/security threats and countermeasures. Interdisciplinary Journal of Contemporary Research in Business, 3(9), 1323.

Verschoor, C. (2012). Governance, risk management and compliance: It can’t happen to us – avoiding corporate disaster while driving success. Internal Auditing, 27(4), 45-46.

The terms offer and acceptance. (2016, May 17). Retrieved from

[Accessed: April 19, 2021]

"The terms offer and acceptance." freeessays.club, 17 May 2016.

[Accessed: April 19, 2021]

freeessays.club (2016) The terms offer and acceptance [Online].
Available at:

[Accessed: April 19, 2021]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: April 19, 2021]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: April 19, 2021]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: April 19, 2021]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: April 19, 2021]
close
Haven't found the right essay?
Get an expert to write you the one you need!
print

Professional writers and researchers

quotes

Sources and citation are provided

clock

3 hour delivery

person