Hypothesis: Educating staff to be on the look out for network vulnerabilities.
Proposal outline:
Introduction:
- will go over why securing the network is important for personal and corporation use.
- give a few example to what happens when a network is not properly secured.
the many ways a network can be vulnerable and secured.( Literature Review)
- Bi, K., Han, D., Zhang, G., Li, K.-C., & Castiglione, A. (2021)
- PAPADOGIANNAKI, E., & IOANNIDIS, S. (2021)
- Mu, C., Yu, M., Li, Y., & Zang, W. (2014)
- Silva, H., Santos, A., & Nogueira, M. (2015)
Methodology
- Explain why network vulnerabilities are a threat to day to day activities .
- Present many ways to secure the network.
- Present ways to identifying abnormal network activity.
- examine networks that did not have security vulnerabilities fixed in time.
Discussion
- I will discuss why it is important for network to be secured.
- I will explain what happens when a vulnerability is exploited before it could be patched out.
- to discuss ways of monitoring the network for any suspicious activity.
References
- Bi, K., Han, D., Zhang, G., Li, K.-C., & Castiglione, A. (2021). K maximum probability attack paths generation algorithm for target nodes in networked systems. International Journal of Information Security, 20(4), 535–551. https://doi.org/10.1007/s10207-020-00517-4
- PAPADOGIANNAKI, E., & IOANNIDIS, S. (2021). A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. ACM Computing Surveys, 54(6), 1–35. https://doi.org/10.1145/3457904
- Mu, C., Yu, M., Li, Y., & Zang, W. (2014). Risk balance defense approach against intrusions for network server. International Journal of Information Security, 13(3), 255–269. https://doi.org/10.1007/s10207-013-0214-9
- Silva, H., Santos, A., & Nogueira, M. (2015). Routing management for performance and security tradeoff in wireless mesh networks. International Journal of Information Security, 14(1), 35–46. https://doi.org/10.1007/s10207-014-0246-9