Improvement the Security of the Enterprise’s Network Infrastructure in Conditions of Modern Challenges and Limited Resources

2024;
: pp. 155 - 164
1
Lviv Polytechnic National University, Department of Information Protection
2
Lviv Polytechnic National University, Department of Information Protection

challenges, the main stages of the implementation of security solutions, which makes it possible to eliminate potential system vulnerabilities and determine possible information losses, are considered. It is noteworthy that global digitalization gives rise to the development of new technologies and approaches in the information industry. Devices, mechanisms and applications that were previously autonomous are becoming nodes of a global information network. Such a transformation of information technologies significantly expands the landscape of the implementation of cyber threats. Every year, traditional models of computer network security lose their relevance, therefore, in order to protect them from modern cyber threats, it becomes necessary to develop and implement new approaches that would increase the effectiveness of the protection of information systems.

Potential vectors of attacks on the network infrastructure of the enterprise based on the traditional security model were analyzed, typical ways to eliminate them were considered, the components of the Zero Trust Network Access security model were studied, and a number of measures were proposed to increase the resistance of the enterprise network infrastructure to cyber threats.

Taking into account the current trends in the spread of cyber threats and the analysis of selected measures to counter them, the criticality of threat implementation is determined for each of the developed ways of increasing the level of security of the enterprise’s network infrastructure, and the sequence of their implementation is proposed, taking into account the complexity of implementing its protection with limited enterprise resources.

  1. Sosnin O. (2020). Cyfrovizaciya yak nova realnist` Ukrayiny. Lex. Inform. [Digitization as a new reality of Ukraine] Retrieved from: https://lexinform.com.ua/dumka-eksperta/tsyfrovizatsiya-yak-nova-realnis... [In Ukrainian] (Accessed: 15 March 2024).
  2. Fleck A. (2024, February 22). Cybercrime Expected To Skyrocket in Coming Years. Retrieved from https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027 (Accessed: 26 February 2024).
  3. Ashwini Kumari M. and Nandini Prasad K. S. A Behavioral Study of Advanced Security Attacks in Enterprise Networks, 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, India, 2021, pp. 1–5. DOI: 10.1109/CSITSS54238.2021.9682903
  4. Anjum I., Kostecki D., Leba E., Sokal J., Bharambe R., Enck W., Nita-Rotaru C., & Reaves B. (2022). Removing the Reliance on Perimeters for Security using Network Views. Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies. pp. 151–162, https://doi.org/10.1145/3532105.3535029
  5. Sheikh N., Pawar M., & Lawrence V. (2021). Zero trust using Network Micro Segmentation. IEEE INFOCOM 2021 – IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1–6. https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645
  6. Wu Y. G., Yan W. H. and Wang J. Z. Real identity based access control technology under zero trust architecture, 2021 International Conference on Wireless Communications and Smart Grid (ICWCSG), Hangzhou, China, 2021, pp. 18–22, doi: 10.1109/ICWCSG53609.2021.00011
  7. Nair Anita (2021). The Why and How of adopting Zero Trust Model in Organizations. TechRxiv. Preprint. pp. 1–6, https://doi.org/10.36227/techrxiv.14184671.v1
  8. Hines C. D. and Chowdhury M. M. Uncover Security Weakness Before the Attacker Through Penetration Testing, 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, MN, USA, 2022, pp. 492–497, doi: 10.1109/eIT53891.2022.9813950
  9. Abhishek Arote, Umakant Mandawkar. Android Hacking in Kali Linux Using Metasploit Framework, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 3, pp. 497–504, May–June-2021. Available at doi: https://doi.org/10.32628/CSEIT2173111
  10. What are the main challenges and benefits of implementing a zero trust network architecture? (2023, October 6). Retrieved from https://www.linkedin.com/advice/1/what-main-challenges-benefits-implementing-4e (Accessed: 26 February 2024).
  11. Tyshyk I. (2023). Vybir tekhnolohii viddalenoho dostupu dlia efektyvnoi orhanizatsii zakhystu merezhevykh ziednan. Elektronne fakhove naukove vydannia “Kiberbezpeka: osvita, nauka, tekhnika”, 3(19), pp. 34–45. DOI: 10.28925/2663-4023.2023.19.3445
  12. Yuanhang He, Daochao Huang, Lei Chen, Yi Ni, Xiangjie Ma. A Survey on Zero Trust Architecture: Challenges and Future Trends, Wireless Communications and Mobile Computing, vol. 2022, Article ID 6476274, 13 pages, 2022. https://doi.org/10.1155/2022/6476274
  13. Rose S., Borchert O., Mitchell S., & Connelly S. (2020). Zero Trust Architecture. NIST Special Publication 800–207. National Institute of Standards and Technology. pp. 1–50, DOI: 10.6028/NIST.SP.800-207
  14. Koeppen D., MacDonald N., Watts J. (2022, October 3). 7 Effective Steps for Implementing Zero Trust Network Access. Retrieved from: https://emt.gartnerweb.com/ngw/eventassets/en/conferences/hub/identity-a... management/documents/gartner-iam-implementing-zero-trust-network-access.pdf (Accessed: 26 February 2024).
  15. Deloitte Cybersecurity Threat Trends Report 2023. (n.d.). Retrieved from https://www2.deloitte.com/us/ en/pages/risk/articles/cybersecurity-threat-trends-report-2023.html (Accessed: 26 February 2024).
  16. M-Trends 2023: Cybersecurity Insights From the Frontlines, Mandiant. Report. Retrieved from: https://www.mandiant.com/resources/blog/m-trends-2023 (Accessed: 26 February 2024).
  17. The 2024 SonicWall Cyber Threat Report, SonicWall, 2024, Retrieved from: https://www.sonicwall.com/medialibrary/en/white-paper/2024-cyber-threat-report.pdf (Accessed: 26 February 2024).