Preview

Unit 8 Assignment 2 Network Security Applications and Countermeasusures

Satisfactory Essays
Open Document
Open Document
299 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment 2 Network Security Applications and Countermeasusures
Unit 8 Answer Sheet
Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:
* Where does the countermeasure belong in the seven domains of a typical IT infrastructure?
* What CIA functions does the countermeasure provide?
Provide your answers in the table below.
Network Security Applications and Countermeasures | Domains | CIA Function |
Ethical hacker | * Workstation domain | Availability |
Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity |
Access controls | * LAN-to-WAN domain * WAN domain | Confidentiality |
Failover server | * WAN domain * LAN-to-WAN domain | Availability |
Automatic updates | * Workstation domain | Availability |
Cryptography | * LAN-to-WAN domain | Confidentiality |
Data backups | * System/Application domain | Availability |
Logon rights | * LAN domain | Integrity |
Computer cluster | * Workstation domain | Integrity |
Firewalls | * LAN domain | Confidentiality |
Proxies | * LAN-to-WAN domain | Integrity Confidentiality |
Antivirus scanners | * Workstation domain | Confidentiality |
As a reminder, the seven domains of a typical IT infrastructure include the following domains:
* User domain: Actual users
* Workstation domain: Workstations, laptops, and end-point devices, such as smart phones and printers
* LAN domain: Physical and logical LAN technologies—100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN technologies—used to support workstation connectivity to the organization’s network infrastructure
* LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS
* WAN domain: Routers, circuits, switches, firewalls, gateways, and equivalent gear at remote locations, sometimes under a managed service offering by the service provider
* Remote access domain: Virtual private networks (VPNs), laptops

You May Also Find These Documents Helpful

  • Better Essays

    concern of this domain. This domain needs to be protected by securing the physical access to computer rooms and a disaster recovery plan (DRP) should be created including the backup of data. Plan, configure, maintain, and improve all network servers and implements all standards including the Acceptable Use Policy…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    7.1.1 A WAN is a wide area network that is often used by large businesses or corporations. It is impractical for an organization to own an entirety of a WAN because a WAN is decentralized…

    • 725 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    expansion. The following are the key aspects of the IT infrastructure that must be put in place to…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, we need to make sure that we have firewalls set up on our network to filter all incoming traffic. A firewall will stop all traffic coming on to our system that is not meant or not wanted on the Richman Investments network.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The WAN domain consists of the devices and connections between different sites. The wide area network will be under strict security as well. There will be various methods of encrypting network traffic coming and leaving our network. Firewalls will filter traffic between sites to ensure prevention of malicious attacks. (Kim & Solomon,…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    5. Which of the following holds true while hardening an organizational network through security controls?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be…

    • 686 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    LAB 7 Security Basics

    • 1023 Words
    • 3 Pages

    Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not. Software firewall process all requests by using the server resources. Apart from performance limitation, the software firewall has numerous advantages.…

    • 1023 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    Different authentication methods and data security methods and on-going network monitoring plans have been analyzed which will be further discussed in Task 3.2.…

    • 1608 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    The LAN Domain is the group of computers along with all the switches, routers, servers, firewalls, and cables that incorporate the network. This domain can access systems Company wide from anywhere on the LAN Domain which is why we need very strong security on this domain. The building will have specific badge access and data closets and server rooms will have badge and fingerprint access to prevent any unauthorized entry.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ict Notes

    • 2042 Words
    • 9 Pages

    * Wide Area Network(WAN)- the largest network that uses high speed telephone lines, fiber optic connections, or microwaves to link computers that can be thousands or miles apart.It may even incorporate connections through orbiting satellites.…

    • 2042 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Information Technology

    • 3970 Words
    • 16 Pages

    IT is the area of managing technology and spans wide variety of areas that include but are not limited to things such as processes, computer software, information systems, computer hardware, programming languages, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy which are business process automation, providing information, connecting with customers, and productivity tools.…

    • 3970 Words
    • 16 Pages
    Powerful Essays