Analysis of Threat Risk and Vulnerability in Network Security Along with Countermeasures to Overcome the Damages in an Enterprise Network
DOI:
https://doi.org/10.55544/jrasb.2.1.26Keywords:
Threat, Risk, Vulnerability, Security, countermeasuresAbstract
The research is conducted based on analysis of threat, risk and vulnerability in an enterprise network along with countermeasures to overcome the security incidents in an enterprise network. It is clear that most of the businesses are running using internet to store and share data between employees and customers, because data are precious and an asset for an organization. So, there is a high chance of losing data due to threat, risk and vulnerability in an enterprise network. However, there is a need of awareness and understanding between threat, risk and vulnerability including countermeasures to protect data in rest and data in motion in a network. As well as information security aim to protect organizational data from unauthorized access, manipulation and destruction.
Downloads
Metrics
References
Cantero, C. (2009). How to Write a Literature Review. Qualitative Research Reports in Communication, 10(1), 55–60. https://doi.org/10.1080/17459430902839066.
Yassir, A., & Nayak, S. (2012). Cybercrime: a threat to network security. International Journal of Computer Science and Network Security (IJCSNS), 12(2), 84.
Chen, T. M. (2009). Information Security and Risk Management. Idea Group Publishing, 15.
Lai, Y. P., & Hsia, P. L. (2007). Using the vulnerability information of computer systems to improve the network security. Computer Communications, 30(9), 2032–2047. https://doi.org/10.1016/j.comcom.2007.03.007.
Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43–69. https://doi.org/10.1016/j.ins.2017.08.063.
Friedberg, I., Skopik, F., Settanni, G., & Fiedler, R. (2015). Combating advanced persistent threats: From network event correlation to incident detection. Computers and Security, 48, 35–57. https://doi.org/10.1016/j.cose.2014.09.006.
Andersson, O. (2010). analyses during the development of IT systems in the Swedish Armed Forces. Science.
Lakshmanan, A. (2020). Literature Review on the latest security & the vulnerability of the Internet of Things (IoT) & a Proposal to Overcome. no. April.
Gibson, D. (2017). CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide (A. and C. C. Karen (ed.)). CompTIA.
Samonas, S., & Coss, D. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security, 10(3).
Aliero, H. M., & Ibrahim, S. S. (2012). Network Security Attacks, Impact and Countermeasures. International Journal of Marketing and Technology, 2(3), 1–13.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Maroof Khan, Gulab Jan Sajjad
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.