Week 2 Posting - Attack Vectors

 Network security is a growing concern for organizations of all sizes as attackers become more sophisticated and determined to get into a restricted network. While virtualized and appliance-based tools can provide security for most applications and services, it is important to remember that no single tool can protect against all known threats. It is essential that organizations have a multi-layer security plan that is tested and checked annually. Networks that is deemed secured should still include regular monitoring, management, and updates. This week's chapters provide an excellent overview of the tools and policies needed to respond to potential network security threats. It is important to remember, that security is an ongoing process and regular updates to tools and policies are necessary in order continuously secure an organization's structure network. With the right tools and policies in place the defense of the network may be more automated but should still be checked and modified to ensure that their networks are protected against the ever-evolving landscape of threats. The most common types of threats include zero-day exploits.

Comments