Please Note:
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Discuss the types of controls a company could implement to help secure a company’s network.
Two of the biggest network controls that come to mind are encryption and firewalls. Requiring access to the network will help put a barrier between just anyone with an internet connection and those who are actually supposed to be on the network. Firewalls are a good way to filter through any potential malware or attacks to the network. The firewall essentially acts as a filter and allows what data is supposed to come through while preventing data that shouldn’t. These methods are beneficial to companies to help protect information on the network and prevent business losses due to technical issues and possible attacks. These are great ways to lower risk to a more acceptable level.
-Jacob.
To secure a company’s network, various controls can be implemented, addressing different aspects of security. Perimeter defenses like firewalls and unified threat management systems filter traffic and block unauthorized access. Access control measures, including identity and access management, multi-factor authentication, and network access control, ensure only authorized users can access sensitive data. Data protection involves encryption and data loss prevention to secure data in transit and at rest. Intrusion detection and prevention systems monitor and block suspicious activity. Security information and event management (SIEM) systems analyze security data to detect threats. Deception technologies like honeypots attract attackers to study their methods. Cloud security measures, including cloud access security brokers and secure access service edge, protect cloud services. Implementing a combination of these controls enhances network security and protects against a wide range of threats. Which specific area of network security are you most interested in exploring further?
Braden,
I think you did a good job discussing security controls. I like firewalls and would like to learn more about proxy servers. Using a server to prevent you from getting direct access to the websites you utilize seems helpful in preventing unwanted viruses.
-Jacob
Hello Braden,
After reading your discussion post, I thought you did a great job explaining various controls that can be implemented to improve security. I’m also looking forward to exploring cloud security measures further because I think cloud computing and storage are continuing to be used more and more by people nowadays so I’d like to learn more about it as it continues to grow.
When it comes to controls that help secure a network the best options to set up are encryption, device hardening, and system restore points. Encryption is an important security feature to set up because this makes the data unreadable to outsiders as long as they don’t have the encryption key for the device. Device hardening is when the owner disables all unnecessary accounts, services, and subsystems which strengthens the security of the device from hackers trying to access the network through an unused account or service. System restore points are also a great way to control your data by backing it up in case of a natural disaster destroying the server or if the system is infected with a virus then you can restore it from the disk image. With all three of these options implemented your system will become very secure but you’ll need to continually monitor it because even though it’s pretty secure there are always vulnerabilities that hackers find and will exploit the system if they find them.
Great discussion, I agree with you I also think encryption is a very important network security to use for a business setting. I like how you mentioned the device hardening one as well and you have great information over everything you wrote here.
A company can implement a lot of different types of network security but I’m going to mention two I think are the most important. Which are firewalls and data encryption, the firewalls are one of the more commonly and known one as it helps keep your information and network from the untrusted networks, like a wall hence the name firewall. Encryption is important to be mentioned because it keeps your information from the other outside and untrusted networks safe for you to use them wen needed.
Hello Amy,
I agree with you I do think that firewall and encryption are imperative to a companies network security. firewalls are very commonly used even in our personal lives and computers as well as work so I can understand why you would say that do you think that surveillance is an overlook security system that is commonly used I noticed as I was looking at other students I noticed no one said surveillance. Is that something that you think is important to network security?
There are multiple types of control systems that are used to protect a companies network. Some of the more popular ones are firewalls, access control, log monitoring, intrusion detection system, surveillance, and access controls just to name a few. One of the most popular systems for protecting a company‘s network is surveillance. Often times this system is overlooked because it is so commonly used, but surveillance is one of the best ways to , monitor a companies physical network hardware it also allows a company to visually monitor any type of servers and suspicious activity. I also feel as though intrusion detection systems, also known as IDS are dire to a companies protection against vulnerabilities. IDS allows a company to monitor any type of suspicious activity and create events when there is suspicious activity, so it can be corrected. In my opinion IDS may be one of the most important forms of network control. I do believe firewalls and encryption are also imperative to accompanies security. Encryption allows us to send and receive sensitive data without the worry of that data being shared with a third-party.
For a company to secure their network they would need to first prevent any attacks. Things like data encryption and firewalls can help protect data and prevent attackers. Secondly, the company could also make sure to train their employees’ thoroughly to not fall for any potential security risk. The company would also have to make sure that no one employee has too much access to files that should not have. Lastly, they could also make plans incase a attack were to happen. If the preventative measures do not work the company would have to have a way to detect any breach. They could do this by monitoring network traffic and see who is doing what on the network. This could help figure out who was responsible for the attack or how the attacker got through any of the preventative measures in place.
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .