Southern New Hampshire University CYB 250 Cyber Defense 7-1 Final Project Submission 03:38:10 GMT -05:00 With the implementation of our new headsets, there are several factors that should be implemented to improve our security and better protect our equipment and network. Initially, we will b...
, With the implementation of our new headsets, there are several factors that should be
implemented to improve our security and better protect our equipment and network. Initially, we
will be focusing on protecting our data from the human factor and strategies for protecting our
data and network in it’s entirety. During our most recent audit several aspects of our current
system proved to be in need of change.
One of the most difficult aspects of cyber security is the human aspect. It is difficult to
protect a network from both human curiosity and human mistakes. There are a variety of
emerging trends in the field to assist with the efforts being made to better protect users from
themselves and, therefore, protecting the company and our products from their mistakes or
malicious behavior.
The suggested trend to help protect against the human factor is multi-factor
authentication (MFA.) MFA is the action of proving that the user is authorized through multiple
steps to verify their authentication. This is done by providing more information than just a
password. This could include a fingerprint scan, a confirmation text, a secondary PIN or a code
generated by an application (More than a Password: CISA).
According to the US national security cyber chief, MFA is capable of blocking as much
as 80-90% of cyber-attacks (Muncaster, 2021). Passwords are just a single step in protecting data
and are, usually, very easy to get around if a hacker is determined. Many methods of hacking,
such as phishing or keylogging attacks give the attacker your password, so it hardly matters how
long or complicated your password is (Weinert, 2019). MFA forces them to also know a one
time use code that can only be generated by the users’ phone, or other authentication device,
which the hacker shouldn’t have access to.
03:38:10 GMT -05:00
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller newage. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.