Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 4 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Government highlights technical options to defend networks

by The Gurus
January 23, 2015
in Editor's News
Share on FacebookShare on Twitter

Putting in place security controls and processes and adopting a defence-in-depth approach are the keys ways to reduce your exposure to a cyber attack.
 
According to a Government document, on “Common Cyber Attacks: Reducing The Impact”, preventing, detecting or disrupting the attack at the earliest opportunity limits the business impact and the potential for reputational damage.
 
The report claimed that there are “effective and affordable ways” to reduce your organisation’s exposure to the more common types of cyber attack on systems that are exposed to the internet, and named these as:
 
Boundary firewalls and internet gateways to establish network perimeter defences, block access to known malicious domains and prevent users’ computers from communicating directly with the internet;
 

  • Malware protection to establish and maintain malware defences to detect and respond to known attack code;

 

  • Patch management to patch known vulnerabilities with the latest version of the software, to prevent attacks which exploit software bugs;

 

  • Whitelisting and execution control to prevent unknown software from being able to run or install itself;

 

  • Secure configurationto- restrict the functionality of every device, operating system and application to the minimum needed for business to function;

 

  • Password policy to ensure that an appropriate password policy is in place and followed;

 

  • User access control, including limiting normal users’ execution permissions and enforcing the principle of least privilege.

 
It also recommended security monitoring, user training and awareness and security incident management if your organisation is likely to be targeted by a more technically capable attacker.
 
The report devolved the stages of attack into four categories of mitigation – survey, delivery, breach and affect. The survey stage recommended user training, education and awareness as well as secure configuration to minimise the information that Internet-facing devices disclose about their configuration and software versions, and ensures they cannot be probed for any vulnerabilities.
 
The delivery options available to an attacker can be significantly diminished by applying and maintaining a small number of security controls, which are even more effective when applied in combination, it said.
 
In terms of mitigating the breach, it said that the ability to successfully exploit known vulnerabilities can be effectively mitigated with just a few controls, which are best deployed together. “All commodity malware depends on known and predominately patchable software flaws,” it said. “Effective patch management of vulnerabilities ensures that patches are applied at the earliest opportunity, limiting the time your organisation is exposed to known software vulnerabilities.”
 
Malware protection, particularly within the internet gateway and secure configuration were the recommendations here, as they can remove unnecessary software and default user accounts, and can also ensure that default passwords are changed, and any automatic features that could immediately activate malware are turned off.
 
Finall
y, mitigating the affect stage means that if all the measures for the survey, delivery and breach stages are consistently in place, the majority of attacks using commodity capability are likely to be unsuccessful.
 
“However, if your adversary is able to use bespoke capabilities then you have to assume that they will evade them and get into your systems,” it said. “Ideally, you should have a good understanding of what constitutes ‘normal’ activity on your network, and effective security monitoring should be capable of identifying any unusual activity.”
 
The report said that the threat of attack is ever present as new vulnerabilities are released and commodity tools are produced to exploit them, and doing nothing is no longer an option. “Protect your organisation and your reputation by establishing some basic cyber defences to ensure that your name is not added to the growing list of victims,” it said.

FacebookTweetLinkedIn
Tags: attackGovernmentMitigation
ShareTweet
Previous Post

Adobe Flash zero day detected, the first of many – Industry views

Next Post

Minecraft claims its users were phished, rather than hacked

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information