+1(978)310-4246 credencewriters@gmail.com
  

CYB-: Risk Management and Information Technology Security

Getting Started

Network Security Applications and Countermeasures

In this assignment, you will be given a list of network security
applications and security countermeasures in a worksheet. You will need
to identify where they belong within the seven domains of a typical IT
infrastructure. Then, you will determine which availability, integrity,
and confidentiality (A-I-C) function they provide. Then, you will write
a diagnostic report explaining your analysis. These exercises will
prepare you to efficiently identify and effectively analyze network
security risks.

Upon successful completion of this assignment, you will be able to:

Identify where various network security applications and security
countermeasures are located within the seven domains of a typical IT
infrastructure.

Analyze network security risks using the three categories of risk.

Resources

Textbook:

Principles of Information Security

(Chapters 6-10)

Background Information

As a reminder, the seven domains of a typical IT infrastructure include the following domains:

User Domain:

Actual users

Workstation Domain:

Workstations, laptops, and end-point devices, such as smartphones and printers

LAN Domain:

Physical and logical LAN
technologies—100 Mbps/1000 Mbps switched Ethernet, 802.11-family of
wireless LAN technologies—used to support workstation connectivity to
the organization’s network infrastructure

LAN-to-WAN Domain:

Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS

WAN Domain:

Routers, circuits, switches, firewalls,
gateways, and equivalent gear at remote locations, sometimes under a
managed service offering by the service provider

Remote access Domain:

Virtual private networks (VPNs), laptops with VPN software, and secured socket layer/VPN (SSL/VPN) tunnels

System/Application Domain:

Hardware, operating
system software, database software, client/server applications, and data
that are typically housed in the organization’s data center and
computer rooms

Network Security Table

Network Security Applications and Countermeasures

Domains

CIA Function

Ethical hacker

Intrusion detection system/intrusion prevention system (IDS/IPS)

Access controls

Failover server

Automatic updates

Cryptography

Data backups

Logon rights

Computer cluster

Firewalls

Proxies

Antivirus scanners

Instructions

Review the rubric to make sure you understand the criteria for earning your grade.

Address the following in a professional report:

Briefly describe each of the listed network security applications and security countermeasures.

Identify where each security application or countermeasure is located within the seven domains of a typical IT infrastructure.

Apply the three categories of network security risks to your analysis.

Outline the A-I-C function that each security application or security countermeasure provides.

Given the network security applications and countermeasures in the
first column of the table in the Background Information, explore answers
to the following questions:

Where does the countermeasure belong in the seven domains of a typical IT infrastructure?

What CIA functions does the countermeasure provide?

Copy the table from the Background Information into a Word document, and then enter your answers in it.

After reading the scenario and explanation above, submit your response in a Microsoft Word document following

APA Style

.
Your paper should be two pages in length, excluding the APA title and
Reference pages. Cite any sources utilized in-text and in the
References following APA style.

When you’ve completed your assignment, save a copy for yourself and
submit a copy to your instructor using the Assignment submission page by
the end of the workshop.

  
error: Content is protected !!