You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Preventive Measures Against Network Hacking:

  1. Encryption:
    Encryption converts sensitive information into a secret code that can only be decrypted by authorized users with the correct key. This ensures that even if hackers gain access to the data, they cannot read or use it without the decryption key. Implementing strong encryption protocols for data storage and transmission is essential for protecting sensitive information.
  2. Intrusion Detection System (IDS):
    An IDS monitors network traffic for suspicious activities or potential security breaches. It alerts the security team in real-time when it detects any unusual behavior, enabling them to respond promptly to prevent or mitigate a hacking attempt. Regular updates and maintenance of the IDS are crucial for its effectiveness.
  3. Biometric Systems:
    Biometric systems use unique physical characteristics, such as fingerprints, facial recognition, or iris scans, to authenticate users. These systems provide a higher level of security compared to traditional password-based methods, as they are much harder to replicate or steal. Implementing biometric authentication can significantly reduce unauthorized access to the network.
  4. Periodic Audits:
    Regular information systems audits help identify vulnerabilities in the network and ensure that security protocols are up to date. These audits can uncover weaknesses that hackers might exploit, allowing the company to address them before a breach occurs. Audits should be conducted by both internal teams and external cybersecurity experts for a comprehensive assessment.
  5. Firewall Installation:
    A firewall acts as a barrier between the company’s internal network and external threats. It filters incoming and outgoing traffic based on predefined security rules, blocking unauthorized access while allowing legitimate communication. Installing and properly configuring firewalls can prevent many types of cyberattacks.
  6. Access Restrictions:
    Limiting physical and network access to sensitive systems and data to only those employees who absolutely need it reduces the risk of internal and external breaches. Implementing multi-factor authentication (MFA) and regularly updating access controls are also effective measures in securing the network.