7-2 Project Three Submission Evaluation of Network Protection Technologies Brandon Meadows
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
220
Subject
Computer Science
Date
Jun 10, 2024
Type
docx
Pages
5
Uploaded by BrigadierMeerkatMaster1059
7-2 Project Three Submission: Evaluation of Network Protection
Technologies
CYB 220
Brandon Meadows
10/14/2023
A. Explain how you are employing one of the Fundamental Security Design Principles to inform your recommendation
The strategy I have for developing the security system will be based on the concept of layering as its primary organizational principle. The practice of shielding oneself with many layers of defense is referred to as "layering." These forms of protection can be implemented in either the hardware or the software of a system, and they consist of several checks and balances that ensure
The overall system is secure from a variety of different points of view. These protections can be implemented in either the hardware or the software of a system (Tjaden, 2015). Layering will be applied in this circumstance by deploying many intrusion/detection systems around the company network.
B. Justify a recommended network protection approach. Describe how you balanced effectiveness, cost, and technical capabilities to select the network protection technology
I recommend installing a mixture of NIPS, NIDS, and IDS across the network is the network security method I recommend. In a DMZ at each location, a NIPS appliance with an incoming and outgoing firewall would be installed. I would also
implement NIDS-capable routers at each site. I would install intrusion prevention software on each store's principal server to increase security. The cost-
effectiveness ratio is rarely acceptable to all parties. It is asserted that the corporation would prefer to spend in marketing rather than IT infrastructure, however no monetary sum is specified. Given the severity and relevance of this company's network security challenges, it seems inexplicable that the recommended solution would fall short of offering complete protection due to restricted resources. Adoption of a solution has a steady cost in terms of ROI (return on investment) or savings on lost items, however inventory loss is dynamic and continuing, resulting in an organization-wide cost that is endless. Given that the company now employs IT specialists at each location, future training costs should be seen as minimal.
C. Recommend resources (e.g., organizational assets, workforce allocation, policies/procedures, hardware) that are necessary for implementing or monitoring your chosen network protection approach. These resources should optimize the technology or maximize organizational resources. Explain your recommendation using an adversarial mindset or systems thinking approach
I believe having an existing network infrastructure is a necessary organizational asset for the delivery of the stated solution; if this asset were not there, the costs associated with the project would rise. In addition, the development and ongoing monitoring of an IDS/IPS system would unquestionably benefit from the presence of a centralized and well-established IT department at the main headquarters, as well as IT professionals located at each location. To develop
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Computer Science
Pick one security law that most interests you with an emphasis on the areas that impact information security and assurance. Write a 1 page summary that includes what it is, what is its purpose/relevance, why is it important, who or what it applies to, ramnifications if not followed, and impact on information and assurance.
arrow_forward
Principles of Information Security
Case :
A client of yours is concerned about the external intrusion on their corporate network, and those inside their environment that they seek to fire! They've heard about firewalls and they need your professional opinion as to whether, with the implementation of firewalls, they can feel 100% secure. Still, on their quest to maintain a secure environment, especially with much concern on external attacks, they would like to understand what Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) are about.
Q : What Firewalls are designed to prevent and how?
arrow_forward
Principles of Information Security
Case :
A client of yours is concerned about the external intrusion on their corporate network, and those inside their environment that they seek to fire! They've heard about firewalls and they need your professional opinion as to whether, with the implementation of firewalls, they can feel 100% secure. Still, on their quest to maintain a secure environment, especially with much concern on external attacks, they would like to understand what Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) are about.
Q : What can IDS and IPS protect against?
arrow_forward
Describe the principles of "Zero Trust Network Access" (ZTNA) and its relevance in modern system security.
arrow_forward
Two security architecture models should be contrasted.
arrow_forward
Describe, contrast, and compare any two of the following security architecture models:
arrow_forward
Expert data hackers are exploiting vulnerabilities in the banking industry. The efforts of The Cybersecurity and Infrastructure Security Agency of the United States (CISA) increased the conviction rate due to coordinated efforts of exchanging information about data intrusion events across the United States Banking Industry.
Instructions
The purpose and intent to detect irregular patterns is a priority with CISA more than in the past, as highly classified information is being lost and passwords and logins are being stolen (such as those belonging to the Pentagon).
Research the (CISA) topic list for three frauds perpetrated by hackers show on the Department of Homeland Security's TopicsLinks to an external site. page.
Describe how each fraud is perpetrated and devise a cyber-detection risk plan according the direction of the CISA rules. Support your rationale and provide examples.
arrow_forward
Book title: Cybersecurity Essentials - Charles J. BrooksChapter 1 - Infrastructure security in the Real world
From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category.
1. Policy creation sample ofmanaging access to authorized devices and resources based on the following items (NIST PR.AC-1).
2. Method creation sample of controlling physical access to secured assets (NIST PR.AC-2).
3. Action plan creation sample of informing and training general employees (NIST PR.AT-1).
4. Plan sample of helping privileged users understand their job roles and responsibilities (NIST PR.AT-2).
(Refer to screenshot for reference)
arrow_forward
Two alternative security architecture models should be compared and contrasted.
arrow_forward
Book title: Cybersecurity Essentials - Charles J. Brooks
Chapter 1 - Infrastructure security in the Real world
From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category.
2. Inventory creation sample of cyber assets (software platforms and applications) within the organization (NIST ID.AM-2).
3. Prioritize the organization’s assets based on their criticality or value to the business functions of the organization (NIST ID.BE-3).
4. Identify any assets that produce dependencies or provide critical functions for any of the organization’s critical services (NIST ID.BE-4).Create a risk assessment of asset vulnerabilities identified (NIST ID.RA-1, 3).
(Refer to screenshot for reference)
arrow_forward
It is essential to describe, evaluate, and contrast at least two distinct security architecture models.
arrow_forward
What does the term "security" mean in the context of information and communication technologies? In your opinion, what are some of the most pressing concerns regarding physical security today? Organizations can be attacked in a variety of ways, each appropriate to the specifics of the target.
arrow_forward
Book title: Cybersecurity Essentials - Charles J. Brooks
Chapter 1 - Infrastructure security in the Real world
From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category.
1. Inventory creation sample of physical assets (devices and systems) within the organization (NIST ID.AM-1)?
2. Inventory creation sample of cyber assets (software platforms and applications) within the organization (NIST ID.AM-2).
3. Prioritize the organization’s assets based on their criticality or value to the business functions of the organization (NIST ID.BE-3).
4. Identify any assets that produce dependencies or provide critical functions for any of the organization’s critical services (NIST ID.BE-4).Create a risk assessment of asset vulnerabilities identified (NIST ID.RA-1, 3).
(Refer to screenshot for reference)
arrow_forward
Listed below are some instances of how a security framework may be used to assist in the design and deployment of a network security architecture. Is there such a thing as information security governance, and how does it function? Who in the organization should be in charge of making the necessary preparations?
arrow_forward
Book title: Cybersecurity Essentials - Charles J. BrooksChapter 1 - Infrastructure security in the Real world
From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category.
1. Sample type of response plan that might be necessary when general physical security is breached at the facility (NIST RS.AN-1, 2, 3)?
2. Considering the information kept on the company’s servers, which type of response plan might be necessary when physical security is breached in the server room (NIST RS.CO-4, 5)?
(Refer to screenshot for reference)
arrow_forward
The issues of authentication and access in IT security need to be
investigated.
Access and Authentication in Information Security should be examined.
arrow_forward
The two security architecture models you have selected to distinguish between should be explained, contrasted, and compared.
arrow_forward
Explain and contrast two security architecture models.
arrow_forward
Any two security architecture models should be described, compared and contrasted
arrow_forward
Describe, compare and contrast any two security architecture models
arrow_forward
The design of systems translates the specifications into componenents that will implement them. The design will satisfy the specifications if and only if under all relevant circumstances, the design will not permit the system to violate those specifications. In cybersecurity, there are specific design principles that can support security policies and usually the principle are build on the ideas for simplicity and restrictions.
Identify three principles that you think are the most important in securing the design? Provide real life implementation example? Discuss and provide citation if needed?
arrow_forward
What are the key differences between the top-down and bottom-up approaches to the protection of confidential information? Why is it better to work from the top down rather than working from the bottom up?
arrow_forward
3. Access control is one of the security approaches that enable an organization to restrict access
of its group of users to information or tangible assets.
a) Explain any TWO (2) the importance of access control implementation in an organization.
b) Describe THREE (3) principles required to apply the access control.
c) By considering Uniec Campus System, why a different group of users such as student
and lecturer are assigned with different access rights to the same information such as
coursework?
arrow_forward
Case study 1 Chapter 7 - Investigating Theft Act
Assuming you are an agent with the Federal Bureau of Investigation, do the following:
1. Plan and coordinate an investigation in a manner that would not arouse suspicion from Cummings and Baptiste.
2. Create a vulnerability chart to coordinate the various elements of the possible fraud.
3. Assuming your investigation used surveillance and/ or covert investigation techniques, what types of surveillance and/or covert operations would you use? How would technology play a role in this part of the investigation?
4. Finally, how would analysis of physical evidence help in this investigation? What types of physical evidence would be especially helpful?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- Computer Science Pick one security law that most interests you with an emphasis on the areas that impact information security and assurance. Write a 1 page summary that includes what it is, what is its purpose/relevance, why is it important, who or what it applies to, ramnifications if not followed, and impact on information and assurance.arrow_forwardPrinciples of Information Security Case : A client of yours is concerned about the external intrusion on their corporate network, and those inside their environment that they seek to fire! They've heard about firewalls and they need your professional opinion as to whether, with the implementation of firewalls, they can feel 100% secure. Still, on their quest to maintain a secure environment, especially with much concern on external attacks, they would like to understand what Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) are about. Q : What Firewalls are designed to prevent and how?arrow_forwardPrinciples of Information Security Case : A client of yours is concerned about the external intrusion on their corporate network, and those inside their environment that they seek to fire! They've heard about firewalls and they need your professional opinion as to whether, with the implementation of firewalls, they can feel 100% secure. Still, on their quest to maintain a secure environment, especially with much concern on external attacks, they would like to understand what Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) are about. Q : What can IDS and IPS protect against?arrow_forward
- Expert data hackers are exploiting vulnerabilities in the banking industry. The efforts of The Cybersecurity and Infrastructure Security Agency of the United States (CISA) increased the conviction rate due to coordinated efforts of exchanging information about data intrusion events across the United States Banking Industry. Instructions The purpose and intent to detect irregular patterns is a priority with CISA more than in the past, as highly classified information is being lost and passwords and logins are being stolen (such as those belonging to the Pentagon). Research the (CISA) topic list for three frauds perpetrated by hackers show on the Department of Homeland Security's TopicsLinks to an external site. page. Describe how each fraud is perpetrated and devise a cyber-detection risk plan according the direction of the CISA rules. Support your rationale and provide examples.arrow_forwardBook title: Cybersecurity Essentials - Charles J. BrooksChapter 1 - Infrastructure security in the Real world From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category. 1. Policy creation sample ofmanaging access to authorized devices and resources based on the following items (NIST PR.AC-1). 2. Method creation sample of controlling physical access to secured assets (NIST PR.AC-2). 3. Action plan creation sample of informing and training general employees (NIST PR.AT-1). 4. Plan sample of helping privileged users understand their job roles and responsibilities (NIST PR.AT-2). (Refer to screenshot for reference)arrow_forwardTwo alternative security architecture models should be compared and contrasted.arrow_forward
- Book title: Cybersecurity Essentials - Charles J. Brooks Chapter 1 - Infrastructure security in the Real world From the information provided in the second scenario, consider the NIST functions detailed in this section and then write what to observe as they relate to each category. 2. Inventory creation sample of cyber assets (software platforms and applications) within the organization (NIST ID.AM-2). 3. Prioritize the organization’s assets based on their criticality or value to the business functions of the organization (NIST ID.BE-3). 4. Identify any assets that produce dependencies or provide critical functions for any of the organization’s critical services (NIST ID.BE-4).Create a risk assessment of asset vulnerabilities identified (NIST ID.RA-1, 3). (Refer to screenshot for reference)arrow_forwardIt is essential to describe, evaluate, and contrast at least two distinct security architecture models.arrow_forwardWhat does the term "security" mean in the context of information and communication technologies? In your opinion, what are some of the most pressing concerns regarding physical security today? Organizations can be attacked in a variety of ways, each appropriate to the specifics of the target.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning