Unit 8 Assignment 2 Network Security Applications and Countermeasusures

Topics: Virtual private network, Computer network, Operating system, Personal computer, Router, Ethernet / Pages: 2 (299 words) / Published: Aug 22nd, 2013
Unit 8 Answer Sheet
Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:
* Where does the countermeasure belong in the seven domains of a typical IT infrastructure?
* What CIA functions does the countermeasure provide?
Provide your answers in the table below.
Network Security Applications and Countermeasures | Domains | CIA Function |
Ethical hacker | * Workstation domain | Availability |
Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity |
Access controls | * LAN-to-WAN domain * WAN domain | Confidentiality |
Failover server | * WAN domain * LAN-to-WAN domain | Availability |
Automatic updates | * Workstation domain | Availability |
Cryptography | * LAN-to-WAN domain | Confidentiality |
Data backups | * System/Application domain | Availability |
Logon rights | * LAN domain | Integrity |
Computer cluster | * Workstation domain | Integrity |
Firewalls | * LAN domain | Confidentiality |
Proxies | * LAN-to-WAN domain | Integrity Confidentiality |
Antivirus scanners | * Workstation domain | Confidentiality |
As a reminder, the seven domains of a typical IT infrastructure include the following domains:
* User domain: Actual users
* Workstation domain: Workstations, laptops, and end-point devices, such as smart phones and printers
* LAN domain: Physical and logical LAN technologies—100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN technologies—used to support workstation connectivity to the organization’s network infrastructure
* LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS
* WAN domain: Routers, circuits, switches, firewalls, gateways, and equivalent gear at remote locations, sometimes under a managed service offering by the service provider
* Remote access domain: Virtual private networks (VPNs), laptops

You May Also Find These Documents Helpful

  • Network Security Applications
  • Unit 8 Assignment 2
  • Unit 8 Computer Networks Assignment
  • Unit 8 Assignment 2
  • Unit 8 Assignment 1 Network Hardening
  • Unit 4 Assignment 1: Network Security
  • Unit 8 Assignment
  • Unit 8 Assignment
  • unit 8 assignment
  • Unit 8 Assignment