Preview

Unit 8 Assignment 2 Network Security Applications and Countermeasusures

Satisfactory Essays
Open Document
Open Document
299 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment 2 Network Security Applications and Countermeasusures
Unit 8 Answer Sheet
Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:
* Where does the countermeasure belong in the seven domains of a typical IT infrastructure?
* What CIA functions does the countermeasure provide?
Provide your answers in the table below.
Network Security Applications and Countermeasures | Domains | CIA Function |
Ethical hacker | * Workstation domain | Availability |
Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity |
Access controls | * LAN-to-WAN domain * WAN domain | Confidentiality |
Failover server | * WAN domain * LAN-to-WAN domain | Availability |
Automatic updates | * Workstation domain | Availability |
Cryptography | * LAN-to-WAN domain | Confidentiality |
Data backups | * System/Application domain | Availability |
Logon rights | * LAN domain | Integrity |
Computer cluster | * Workstation domain | Integrity |
Firewalls | * LAN domain | Confidentiality |
Proxies | * LAN-to-WAN domain | Integrity Confidentiality |
Antivirus scanners | * Workstation domain | Confidentiality |
As a reminder, the seven domains of a typical IT infrastructure include the following domains:
* User domain: Actual users
* Workstation domain: Workstations, laptops, and end-point devices, such as smart phones and printers
* LAN domain: Physical and logical LAN technologies—100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN technologies—used to support workstation connectivity to the organization’s network infrastructure
* LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS
* WAN domain: Routers, circuits, switches, firewalls, gateways, and equivalent gear at remote locations, sometimes under a managed service offering by the service provider
* Remote access domain: Virtual private networks (VPNs), laptops

You May Also Find These Documents Helpful

  • Good Essays

    The LAN Domain will include all data closets, physical elements of the LAN, as well as logical elements to be designated by authorized personnel. Authorized personnel will be properly…

    • 471 Words
    • 2 Pages
    Good Essays
  • Better Essays

    concern of this domain. This domain needs to be protected by securing the physical access to computer rooms and a disaster recovery plan (DRP) should be created including the backup of data. Plan, configure, maintain, and improve all network servers and implements all standards including the Acceptable Use Policy…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    7.1.1 A WAN is a wide area network that is often used by large businesses or corporations. It is impractical for an organization to own an entirety of a WAN because a WAN is decentralized…

    • 725 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    expansion. The following are the key aspects of the IT infrastructure that must be put in place to…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, we need to make sure that we have firewalls set up on our network to filter all incoming traffic. A firewall will stop all traffic coming on to our system that is not meant or not wanted on the Richman Investments network.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Included in the LAN are the physical equipment and the actual configurations of the equipment. There are security measures and restrictions applied to the configuration, in which data travels through our organization. These rooms will have a physical and a software security. The logical layer of security can include VPN, SSL, PPTP, and other items. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    5. Which of the following holds true while hardening an organizational network through security controls?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be…

    • 686 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    LAB 7 Security Basics

    • 1023 Words
    • 3 Pages

    Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not. Software firewall process all requests by using the server resources. Apart from performance limitation, the software firewall has numerous advantages.…

    • 1023 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    Different authentication methods and data security methods and on-going network monitoring plans have been analyzed which will be further discussed in Task 3.2.…

    • 1608 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    The LAN Domain is the group of computers along with all the switches, routers, servers, firewalls, and cables that incorporate the network. This domain can access systems Company wide from anywhere on the LAN Domain which is why we need very strong security on this domain. The building will have specific badge access and data closets and server rooms will have badge and fingerprint access to prevent any unauthorized entry.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Detailed description the local area network (LAN) connection of the Head Office and each of the remote sites such as but not limited to:…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ict Notes

    • 2042 Words
    • 9 Pages

    * Local Area Network(LAN)- it is a single site computer network. It consists of as few as two and as many as 500 personal computers or work stations connected by cables within a small geographic area to a special server called the server.…

    • 2042 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Information Technology

    • 3970 Words
    • 16 Pages

    IT is the area of managing technology and spans wide variety of areas that include but are not limited to things such as processes, computer software, information systems, computer hardware, programming languages, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy which are business process automation, providing information, connecting with customers, and productivity tools.…

    • 3970 Words
    • 16 Pages
    Powerful Essays