Abstract
Ways to improve the security of the enterprise's network infrastructure in the face of modern challenges the main stages of the implementation of security solutions which makes it possible to eliminate potential system vulnerabilities and determine possible information losses are considered. It is noteworthy that global digitalization gives rise to the development of new technologies and approaches in the information industry. Devices mechanisms and applications that were previously autonomous are becoming nodes of a global information network. Such a transformation of information technologies significantly expands the landscape of the implementation of cyber threats. Every year traditional models of computer network security lose their relevance therefore in order to protect them from modern cyber threats it becomes necessary to develop and implement new approaches that would increase the effectiveness of the protection of information systems. Potential vectors of attacks on the network infrastructure of the enterprise based on the traditional security model were analyzed typical ways to eliminate them were considered the components of the Zero Trust Network Access security model were studied and a number of measures were proposed to increase the resistance of the enterprise network infrastructure to cyber threats. Taking into account the current trends in the spread of cyber threats and the analysis of selected measures to counter them the criticality of threat implementation is determined for each of the developed ways of increasing the level of security of the enterprise's network infrastructure and the sequence of their implementation is proposed taking into account the complexity of implementing its protection with limited enterprise resources. Key words: computer network micro-segmentation Zero Trust Network Access architecture cyber threat security perimeter.
Publisher
Lviv Polytechnic National University
Reference17 articles.
1. Sosnin O. (2020) Cyfrovizaciya yak nova realnist` Ukrayiny. Lex. Inform. [Digitization as a new reality of Ukraine] Retrieved from: https://lexinform.com.ua/dumka-eksperta/tsyfrovizatsiya-yak-nova-realnist-ukrayiny/ [in Ukrainian] (Accessed: 15 March 2024).
2. Fleck, A. (2024, February 22). Cybercrime Expected To Skyrocket in Coming Years. Retrieved from https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027 (Accessed: 26 February 2024).
3. M. Ashwini Kumari and K. S. Nandini Prasad, "A Behavioral Study of Advanced Security Attacks in Enterprise Networks," 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, India, 2021, pp. 1-5, doi: 10.1109/CSITSS54238.2021.9682903.
4. Anjum, I., Kostecki, D., Leba, E., Sokal, J., Bharambe, R., Enck, W., Nita-Rotaru, C., & Reaves, B. (2022). Removing the Reliance on Perimeters for Security using Network Views. Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies. pp. 151-162, https://doi.org/10.1145/3532105.3535029.
5. Sheikh, N., Pawar, M., & Lawrence, V. (2021). Zero trust using Network Micro Segmentation. IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 1-6. https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484645.