Welcome to Premium Paper Help

Need this expanded  4 Security Recommendations Reports Tung Nkengazong Security

Need this expanded 

4

Security Recommendations Reports

Tung Nkengazong


Security Recommendations Reports

The critical security challenges of BRI require a comprehensive security strategy that is multi-dimensional in approach. In the first place, BRI needs to enhance controls over-identification and authentication. Adoption of multi-factor authentication (MFA) will drastically reduce the likelihood of unauthorized access (Almadani et al., 2023). Besides, stringent password policies with longer passwords and an expiration date will add more strength to its security quotient. Implementing role-based access control ensures that users have only those particular access privileges, thus minimizing the risks associated with excessive privileges that may lead to potential breaches.

Secondly, authorization controls should be refined to ensure users have only the necessary access privileges. RBAC will allow access restriction to users based on job designation and responsibilities, reducing the chance of data breaches because of excess permissions. Separate accounts for database administration operations will increase transparency and accountability, preventing unwanted activity (Omotunde & Ahmed, 2023). Thirdly, data security measures must be substantially enhanced. Data-at-rest encryption will ensure that the information will be safe from unwanted parties, even if there is a physical attack on devices. The encryption should be applied to all data storage facilities, starting with databases and moving to employee gadgets. Upgrading ancient WEP standards to more secure Wi-Fi protocols like WPA3 will reduce risks because of network vulnerabilities. Regular security audits and continuous monitoring for potential intrusions or anomalies should be standard practice to swiftly identify and respond to threats.

Attention should also be given to both physical security and incident response plans. Ensuring access to secure areas with access privileges revoked promptly upon an employee’s termination will avoid unauthorized physical access. Comprehensive incident recovery plans must be developed and maintained to prepare BRI on how to respond effectively against security breaches and thereby reduce the potential for downtime or data loss (NIST, 2021). Details on how the company will contain an infection by malware, recover data, and communicate during a security incident should be included.

Lastly, end-user security should be prioritized to ensure that the prohibition on using private email for official communication and the restriction on public cloud services in storing confidential information reduces the risk of data leakage (Dawood et al., 2023). Continual background verification and tight policies for handling classified information will further ward off insider threats. By implementing all of these recommendations, BRI will improve its security and defend its essential operations from emerging risks.

References

Almadani, M. S., Alotaibi, S., Alsobhi, H., Hussain, O. K., & Hussain, F. K. (2023). Blockchain-based multi-factor authentication: A systematic literature review.
Internet of Things, 100844–100844.

Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (2023). Cyberattacks and security of cloud computing: a complete guideline.
Symmetry,
15(11), 1981. mdpi.

NIST. (2021). Security and privacy controls for federal information systems and organizations.
NIST.

Omotunde, H., & Ahmed, M. (2023). A comprehensive review of security measures in database systems: assessing authentication, access control, and beyond.
Mesopotamian Journal of CyberSecurity,
2023, 115–133.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

JWI 550: Operational Excellence Assignment 2 © Strayer University. All Rights Reserved. This document contains Strayer University confidential and

JWI 550: Operational Excellence Assignment 2 © Strayer University. All Rights Reserved. This document contains Strayer University confidential and proprietary information and may not be copied, further distributed, or otherwise disclosed, in whole or in part, without the expressed written permission of Strayer University. This document is subject to change

Description College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s Name: Student`s ID: Trainee

Description College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s Name: Student`s ID: Trainee Department: Training Organization: Field Instructor Signature: Field Instructor Name: Course Title: MGT 430 CRN: 21932 Internship Start Date: Internship End Date: Academic Year/Semester: 2022 – 2023 / 2nd Semester For Instructor’s

  As one of the leading cancer specialists in Hyderabad, we prioritize affordable medical care alongside state-of-the-art technology. Visit Uma Cancer

  As one of the leading cancer specialists in Hyderabad, we prioritize affordable medical care alongside state-of-the-art technology. Visit Uma Cancer Foundation, w Dr. Madhu Devarasetty, a renowned Surgical Oncologist and robotic Surgeon based in Himayat Nagar, Hyderabad, offers cutting-edge cancer treatments.here we operate Monday to Friday from 06:00 pm