Reply To: OCU C)OST C Discussion Lesson 08
Unauthorized Access is a common issue as hackers can exploit weak passwords, outdated authentication methods and or unpatched systems to gain access to the network. Malware and Ransomware attacks are malicious software that can spread across a network, encrypting files, stealing data or causing disruptions. Last is a Man-in-the-Middle (MitM) in which an attacker can secretly intercept or alter communications between two parties without them knowing, often stealing sensitive information.
Three methods to Protect the Network Infrastructure:
1. Implement strong authentication and Access Controls- using multifactor authentication which we are all familiar with, to enforce strong password policies.
2. Regular Update and Patch systems- Keeping all software, operating systems and firmware updated to fix security vulnerabilities before attackers can exploit.
3. Using Encryption and Secure communication protocols- Encrypt sensitive data and use secure protocols like HHTPS, VPNs, and SSL/TLS to prevent interception.