Business > CASE STUDY > Cyberwarfare - C688 - To: D (All)

Cyberwarfare - C688 - To: D

Document Content and Description Below

Cyberwarfare - C688 - To: Department of Defense (DoD) From: Subject: Cyber Defense Report- Task 3 A.RECOMMENDED SAFEGUAR... DS In any infrastructure such as WIPG, an attack could come in the form of physical or cyber. To help protect WIPG from these types of attack, the following safeguard is recommended: All administrators or any user with privileged access to the system is required to have 2-factor authentication. And such a system should be segmented from the rest system that does not need privileged access. which means all privileged system should not have an external internet connectivity. strong password policy should be implemented across the infrastructure. This will include a minimum of 12 characters with alphabet, numbers and special characters, and prevent a user from reusing passwords. USB drive should be disabled via group policy on all systems to prevent users from plugging malware infested USB drives into WIPG network. Endpoint protection like good Anti-virus should be installed with policy checking all connected systems have the recent update of the anti-virus signature. Data loss prevention (DLP) should be installed in all systems to protect against data exfiltration. Which could signal the presence of an insider threat that needs to be monitored closely. NextGen firewall with unified threat management (UTM) should be installed in all segments of the network. This will have various capabilities to . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
33
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 31, 2022

Number of pages

5

Written in

Seller


seller-icon
helperatsof1

Member since 3 years

48 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 31, 2022

Downloads

 0

Views

 33

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·