Category: Preventing Cyber Intrusion

6.3 – Technology for Preventing Cyber-Intrusion

Firewall – Firewall is a set of related programs, located at network gateway, which helps to protect networks from outside (public network or from Internet) attacks. Any organization with internet connection that allows access from outside network uses firewall to protect…
6.2 – Compliance Plan Against Cyber-Attack

The organization should make a written compliance plan to monitor the highest risks associated with cyber-attacks. The compliance plan must address cyber-attack processes as well as other compliance matters. This plan should include: Policies Training Specific incident response procedures Policies…
6.1 – Cyber-Attack Response Plan

Cyber-attack is a type of attack which is faced by all types of organizations. Considering the prevalent and pervasive nature of cyber-attacks, it is very essential for organizations to focus on practical solutions to prevent attacks through cyber-attack response plans. The response…
6.0 – What is Cyber-Attack?

Cyber-attack is an attempt by a hacker to damage or destroy a computer system or network. Such attacks target national, general public, and corporate groups, and are executed through fake websites, viruses, unauthorized access and other means of stealing official and…