Standards and Models for Network Security Response 2
Response 1
The best way to protect the system from key loggers is by implementing the two-factor authentication process that limits anyone without valid access to information from using the system. The two-factor authentication process nullifies the keyloggers attempts to attack the systems and get information without being noticed (Ashford, 2020). The tow factor authentication method involves users being granted access to information only after they have competed two or extra pieces of evidence that for authentication mechanism that is possession, knowledge and inherence. Generally, the two-factor authentication mechanism implies that the passwords are enough proof for one to access information as they be required to provide more details for authentication purposes like their ID and departments of work. The two-factor authentication method can also work together with the password manager systems for maximum security purposes.
Another analogy for keyloggers is antimalware programs that act as whistleblowers and report instances of information access by the key loggers. The antimalware software will therefore make sure that any time the keyloggers try to access the information without authentication, the program sends a report to the system users to hep in avoiding further damages. The antimalware program therefore acts as a protection and guide through the use of information in the system and keeping track of other unauthorized persons trying to access the system (Edwards, 2020). The antimalware program also deters the hackers form accessing more information from the system to prevent further damage. There the antimalware program can be installed on the server and the computing devices for ease of operation in monitoring information flow and usage by eh authorized and unauthorized persons and give reports.
Response 2
Key loggers are smart hackers who take advantage of any vulnerable opportunity to attack the system and run their malicious operations without being traced. The methods for protection against keyloggers are therefore significant however some have disadvantages. Changing password is a good security option however it can also make the system to be more vulnerable to attack (Whitman & Mattord, 2017). The hackers will have an advantage of guessing the new password based on the old password hence gaining access to the system. The new passwords may sometimes be forgotten and sometimes can be written down and this increases systems vulnerability. The users will also have to bear the pain of resetting the passwords again after they have been forgotten. When changing the passwords, the systems are also under high vulnerabilities for keyloggers who are always on the look and they can use the chance to get access to the information and passwords from the staffs.
A password manger on the other hand has the following disadvantages. The password manger posses a great risk to the system, as the keylogger program can be installed in the computer and used to record the master password that mangers all other passwords hence giving a leeway of access to information (Hypponen, 2020). the hacker also comprises other systems making it vulnerable to attack. The password managers are also set target for the keyloggers and likewise it may not be easy for one to login using multiple devices to check on the systems performance. Therefore, the risk of using a password manager is higher compared to other methods of providing data protection from keyloggers. The malware makers may also target the computers to steal the passwords also to expose the passwords of several systems and a higher risk rate.
References
Ashford, W. (2020). Time to rethink business continuity and cyber security. Retrieved from: https://www.computerweekly.com/opinion/Time-to-rethink-business-continuity-and-cyber-security
Edwards, J. (2020). Data storage security best practices for avoiding cyber-attacks. Retrieved from: https://searchstorage.techtarget.com/tip/Data-storage-security-best-practices-for-avoiding-cyberattacks?_ga=2.226133210.1505231350.1594664835-1185297811.1594306554
Hypponen, M. (2020). Fighting Viruses, Defending the Net. Retrieved from: https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net?language=en
Whitman, M. E., & Mattord, H. J. (2017). Principles of information security (6th ed.). Boston, MA: Course Technology. ISBN-13: 9781337102063.