Skip main navigation

How to Protect Your Network Against Cyber Attacks

In this video, you will learn how to protect your network from the types of physical attacks reviewed in the previous videos.
6.5
So these attacks tend to be subtle, and they could be hard to detect. So how do we prevent these attacks? Well, never plug in an unknown USB device. If you find a USB drive on the ground, for example, hand it over to the IT department or a supervisor. Hopefully you have some sort of policy in place when it comes to USB devices that are found. Consider restricting USB devices or the types of USB devices allowed. You could do this if you’re on a Windows network and you could use group policy to begin restricting USB ports that are being used and type of devices that are being used on the network.
46.3
This may or may not prevent things like USB Rubber Ducky per se, because again, it thinks it’s a USB keyboard. If you’re not on a Windows network or you don’t want to do it through group policy, there are third-party vendors out there that will have dissimilar tools that can actually do this. And you also want to minimise your exposure to USB drives on your computer. So minimising the exposed USB ports on your computer can help minimise a rogue person walking over and just plugging in a USB device in your computer. So things like this will help you prevent physical attacks on a USB level.
86.1
So in next video we’re going to get a little sneaky with Man in the Middle Attacks. Thanks for watching. I’ll see you in the next video.
In this video, you will learn how to protect your network from the types of physical attacks reviewed in the previous videos.
Physical attacks to your network can cause a great deal of damage. Some people may have a misconception that it is easier to protect your network from physical attacks as they are more tangible than cyber attacks, but physical attacks are often subtle and difficult to detect. Finally, you will learn how to prevent these attacks from occurring.
Reflect and share: How are you being vigilant against physical attacks in your network? Do you have different strategies for protecting your personal and your professional network? Share your comments in the section below.
This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education

close