Security Strategy

Security Strategy

IT Security strategy is similar to Military strategy, which involves implementing different defense mechanisms in different layers so that if one mechanism fails, next might stop as an attack from progressing further. Network Security Solutions includes a firewall, web filters, intrusion detection & prevention for packet filtering, stateful packet inspection and threat detection on the basis of traffic behavior. Endpoint protection solutions include anti-malware, personal firewall, enterprise mobility management and solutions to detect anomalous activities on endpoints. Data is very important for any corporate, hence data and application security solutions are usually deployed on critical data. The alerts generated by Network Security Solutions, Endpoint Security Solutions and Data Security Solutions are collected at Security Operations Centre and further security teams do the forensic analysis to understand the attack progression and initiate incident response system. Excess amounts of logs and false-positive alerts are considered as “noise” and security teams need to identify and prioritize the handling of incidents, which are a real risk to businesses. It is humanly impossible to analyze the massive log data, hence the concept of machine learning is used to effectively and efficiently log data analyzing. Machine learning is playing an increasingly important role in the security domain, mostly for identifying known threats. However Attackers do bypass the preventive controls by new delivery methods, hence such new threat data do require human expertise. Once detected, the attack needs to be contained to prevent spreading and further doing damage. Threat containment can be automated in a few cases but mostly it also requires human action of the basis of expert analysis. Regulatory compliances and good security practices help from any threat and increasing the security of the network.

The increasing uses of Mobile devices & Cloud applications have given more opportunities for attackers to intrude into corporate networks. There is no doubt that Cyber Attackers have outpaced the Security preparations of the Corporate World. Many times Attackers get success in bypassing security perimeter controls, enter the network and remain undetected and exploit the confidential data. It is time for every Corporate to improve the IT security strategy and get a step ahead of Attackers.  

Cdr Sanjeev Singh (Retd)

CISO and Data Protection Officer at Birlasoft

4 年

Nice summarization of almost all aspects of cyber security. Just today, I tried to explore some of the areas mentioned in your article at https://www.dhirubhai.net/pulse/modern-defense-part-2-cdr-sanjeev-singh-retd-/?trackingId=0hGObmqHQDK89LkkEAf4qQ%3D%3D

回复

要查看或添加评论,请登录

Prof (Dr) JS Sodhi的更多文章

  • Light of Humanity

    Light of Humanity

    Today humanity is grappling with never seen before a generational medical crisis, which is now becoming an economic…

    1 条评论
  • Joy of Giving

    Joy of Giving

    Mahatma Gandhi said that the “best way to find yourself is to lose yourself in the service of others.” We must…

    4 条评论
  • Power of Mind

    Power of Mind

    A mind is a powerful force. This mind can enslave us or can empower us.

    4 条评论
  • Success Mantra

    Success Mantra

    We begin our life full of hopes, aspirations, dreams and energy to face the challenge of the World. We aspire to do…

    3 条评论
  • Emotional Intelligence

    Emotional Intelligence

    Emotional intelligence is as important as other skills for outstanding leadership. Dealing effectively with emotions is…

    3 条评论
  • Prosperity in Pandemic

    Prosperity in Pandemic

    Year-2020 is a turbulent time for everyone and is being declared worst for all. Covid has infected millions and the…

  • Digital Crime

    Digital Crime

    Digital media and the Internet have provided new opportunities to perpetrate crime to Cyber Criminals. Criminals have…

    1 条评论
  • Die with Memories and not with Dreams

    Die with Memories and not with Dreams

    The memories are what keep you going, make you live and are the foundation of life long dreams. Make your dreams come…

    2 条评论
  • Cyber Security Awareness

    Cyber Security Awareness

    All of us have become more dependent on the Internet for most of our daily activities. The Internet has changed the way…

    2 条评论
  • Space in Life

    Space in Life

    Newton’s law says that every action has an equal and opposite reaction. Should it imply on human behavior too?.

    4 条评论

社区洞察

其他会员也浏览了