Analysis of Threat Risk and Vulnerability in Network Security Along with Countermeasures to Overcome the Damages in an Enterprise Network

Authors

  • Maroof Khan Lecturer, Department of Computer Science, Paktia University, AFGHANISTAN.
  • Gulab Jan Sajjad Dean of Computer Science, Information System, Paktia University, AFGHANISTAN.

DOI:

https://doi.org/10.55544/jrasb.2.1.26

Keywords:

Threat, Risk, Vulnerability, Security, countermeasures

Abstract

The research is conducted based on analysis of threat, risk and vulnerability in an enterprise network along with countermeasures to overcome the security incidents in an enterprise network. It is clear that most of the businesses are running using internet to store and share data between employees and customers, because data are precious and an asset for an organization. So, there is a high chance of losing data due to threat, risk and vulnerability in an enterprise network. However, there is a need of awareness and understanding between threat, risk and vulnerability including countermeasures to protect data in rest and data in motion in a network. As well as information security aim to protect organizational data from unauthorized access, manipulation and destruction.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Cantero, C. (2009). How to Write a Literature Review. Qualitative Research Reports in Communication, 10(1), 55–60. https://doi.org/10.1080/17459430902839066.

Yassir, A., & Nayak, S. (2012). Cybercrime: a threat to network security. International Journal of Computer Science and Network Security (IJCSNS), 12(2), 84.

Chen, T. M. (2009). Information Security and Risk Management. Idea Group Publishing, 15.

Lai, Y. P., & Hsia, P. L. (2007). Using the vulnerability information of computer systems to improve the network security. Computer Communications, 30(9), 2032–2047. https://doi.org/10.1016/j.comcom.2007.03.007.

Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43–69. https://doi.org/10.1016/j.ins.2017.08.063.

Friedberg, I., Skopik, F., Settanni, G., & Fiedler, R. (2015). Combating advanced persistent threats: From network event correlation to incident detection. Computers and Security, 48, 35–57. https://doi.org/10.1016/j.cose.2014.09.006.

Andersson, O. (2010). analyses during the development of IT systems in the Swedish Armed Forces. Science.

Lakshmanan, A. (2020). Literature Review on the latest security & the vulnerability of the Internet of Things (IoT) & a Proposal to Overcome. no. April.

Gibson, D. (2017). CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide (A. and C. C. Karen (ed.)). CompTIA.

Samonas, S., & Coss, D. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security, 10(3).

Aliero, H. M., & Ibrahim, S. S. (2012). Network Security Attacks, Impact and Countermeasures. International Journal of Marketing and Technology, 2(3), 1–13.

Downloads

Published

2023-03-01

How to Cite

Khan, M., & Sajjad, G. J. (2023). Analysis of Threat Risk and Vulnerability in Network Security Along with Countermeasures to Overcome the Damages in an Enterprise Network. Journal for Research in Applied Sciences and Biotechnology, 2(1), 186–190. https://doi.org/10.55544/jrasb.2.1.26