The web application firewall must be strengthened, there are newer more specific firewalls working against DoS attacks such as the dotDefender (Applicure Technologies, 2016).
Any workstation that connects to the network must also be protected properly to ensure that intruders do not use it as an access point.
Passwords and usernames must not be shared
Workstations, individual laptops and any other device connected to the wireless network must have up to date virus protections as mandated by ACT
Network security must be constantly checked by means of test attacks conducted in a controlled environment within ACT
Responses to the identified security incidents at ACT
Design auditing and incident response procedure
Auditing procedures will involve auditors (security consultants) who will check the compliance of the network with the prescribed security policy every three months.
The incident response procedure prepared for the attacks is a series of steps from incident discovery, notification, analysis, response and containment.
Document security incidents
Any security incident that happens in the network of ACT will be recorded and documented in order for the audits that happen. Depending on the severity of the incident, the losses that ACT was threatened with changes might be made to the protocol in order to avert the issue again.
Implement configurations aligned with incident response procedure design
The bottlenecks that could prevent timely response for network breach are identified and configurations are set accordingly.
During the occurrence of an incident, the network administrators are trained to isolate the incident in the incident response time so the outage impact will be controlled.
Test and sign off
Client testing is done with the first level requirements used to write the test
Different test scenarios were enacted and the results have satisfied ACT
Training and manuals have been given to ACT network administrators
Network security is an important concept in network design. Most networks such as ACT were created and are being run for quite some duration now, without much upgrades to the systems or to the network components. Furthermore, many organizations hire networking personnel for networking maintenance and not for security. The client ACT has been advised on the network security threats they might be exposed to and the protocol/ policy they have to comply in order to handle the same.
留学生论文写作提升，可以找新西兰论文代写Advanced Thesis平台机构，新西兰论文代写Advanced Thesis平台机构经过多年的经营与磨砺，已经发展成为一家专业的美国论文代写平台机构，而且论文代写价格公平合理，擅长写作科目广泛，有论文代写、美国代写、essay代写、report代写、assignment代写等论文服务，良好的口碑和信誉、丰富的论文代写经验值得留学生选择和信赖，详情可以咨询专职客服：2852780208