Cyberwarfare - C688 - To: Department of Defense (DoD) From: Subject: Cyber Defense Report- Task 3 A.RECOMMENDED SAFEGUARDS In any infrastru
...
Cyberwarfare - C688 - To: Department of Defense (DoD) From: Subject: Cyber Defense Report- Task 3 A.RECOMMENDED SAFEGUARDS In any infrastructure such as WIPG, an attack could come in the form of physical or cyber. To help protect WIPG from these types of attack, the following safeguard is recommended: All administrators or any user with privileged access to the system is required to have 2-factor authentication. And such a system should be segmented from the rest system that does not need privileged access. which means all privileged system should not have an external internet connectivity. strong password policy should be implemented across the infrastructure. This will include a minimum of 12 characters with alphabet, numbers and special characters, and prevent a user from reusing passwords. USB drive should be disabled via group policy on all systems to prevent users from plugging malware infested USB drives into WIPG network. Endpoint protection like good Anti-virus should be installed with policy checking all connected systems have the recent update of the anti-virus signature. Data loss prevention (DLP) should be installed in all systems to protect against data exfiltration. Which could signal the presence of an insider threat that needs to be monitored closely. NextGen firewall with unified threat management (UTM) should be installed in all segments of the network. This will have various capabilities to . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]