employ the use of the subresource integrity approach in preventing future attacks on its website
I prefer the business to employ the use of the subresource integrity approach in preventing future attacks on its website. The system is crucial as it involves applying security features that allow customers’ to use their web browsers without manipulation or undue influence from the Grand Cannon attack system in the verification of resources it is requesting. The subresource system is crucial in ensuring that the business has a short, medium, and long term solution in ensuring the business will not be used as a proxy for DDoS attacks in the future (Quick et al. 5). I also recommend that the employees should not be allowed to carry their devices to the workplace as they can be a source of attacks on the company’s information technology systems.
I suggest that GIAC should try very hard to ensure that it does not integrate its guest wireless and second wireless networks, as this may be a vulnerable access point. It is also essential that the integration of the company’s servers with the public-facing servers is stopped, as it will minimize the chances of hackers gaining access to the system. According to the report, GIAC should limit the authorization providers to Facebook and Google only (Quick et al. 2). The internal employees should authenticate by use of the current centralized identity management solution with the GIAC Enterprises applications being reprogrammed to help in verification and the validation of authentication tokens through the use of an authorization provider before giving accessibility. Furthermore, they will also be configured to sufficiently check on the authorization provider’s signature when OpenID Connect does validation.