Network Security Breaches: Comprehension and Its Implications

Network Security Breaches: Comprehension and Its Implications

Yash Bansal, Shilpa Mahajan
Copyright: © 2023 |Pages: 16
DOI: 10.4018/978-1-6684-8218-6.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Threats on communication networks are proliferating. It is surprising that more than half of Indian organizations have experienced a breach in 2022. These breaches can occur due to various reasons, such as human error, software vulnerabilities, or malicious attacks. Tech executives frequently commit the sin of being unready for network data breaches despite the early indications. The consequences of a network security breach can be severe, including financial losses, damage to reputation, and loss of sensitive data. The punitive damages are severe, and it is easier to lose and much harder to restore the faith of customers. This chapter gives an overview on the evolution of network architecture, the grounds behind data leaks and violations. It also discusses the best approaches to counter the threats, governance structure and emerging developments in network security. This chapter also gives you the analysis on the methodologies adopted for network forensics and explores the viewpoint on where network forensics could be applied.
Chapter Preview
Top

Introduction

For many years, firewalls, VPNs, and antivirus software served as the foundation for network security. Nevertheless, this defence trinity has reached its breaking point. Why? Firstly, Online services are now frequently employed by companies to drive sales, enhance interactions, and streamline workflows, but because network layer standards are protected by today's security architecture, Web platforms are fundamentally unprotected.

Evolution of Network Architecture

  • It is an enormous task for the data security operations to stay up with pace—and even be forward so as never to behave hastily—as new ways to breach technology infrastructure are developed daily. Due to its ability to prevent impulsive attempts on the systems from both the standpoint of the network and by infecting a machine directly, the installation of an effective IDS strategy was essential in a network architecture but with passing time security managers stress that they are perpetually playing tag when it comes to dealing with security governance, market needs, and evolving threats. Although the IDS system are effective as any, predictive analytics and analytics are still laborious manual processes even after regular adjustment (Kozlosky, 2021). Experts and clients claim that signature-matching IDS is gradually losing its relevance in the face of a constantly reducing window of opportunity betwixt weaknesses and exploitation. They gripe about how IDS behaviour is greatly increased by automated attacks and suggests how acquiring all the information and screening the event logs automatically will help us identify the pertinent facts.

  • In a blockchain system, each transaction is saved in a block and added to the chain of last blocks, creating a permanent and tamper-proof record of all transactions. Around 2017 several have seen the most recent stateful inspection firewalls deployed as a new barrier to defend against TCP assaults. This method offered layer 4 protection, but since many modern attacks—like buffer overflows, SQL injections, and cross-site scripting—occurred at the application layer, it was no longer effective to follow those ideals. Just as a workaround for the holes was being developed, it was easy to overlook about the stress it would bring. The inclusion of additional defence from various vendors, as well as application firewall and malware gateways to the perimeter, overburdened the employees in charge of administering it (Qureshi et al., 2021). As if this weren't enough, many businesses believed they were safe from loads of rising attacks. But those assaults may end up being the favoured method used by today organizations or felonious syndicates to impede commerce or drag down an enterprise.

Complete Chapter List

Search this Book:
Reset