7-2 Project Three Submission Evaluation of Network Protection Technologies Brandon Meadows

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

220

Subject

Computer Science

Date

Jun 10, 2024

Type

docx

Pages

5

Uploaded by BrigadierMeerkatMaster1059

7-2 Project Three Submission: Evaluation of Network Protection Technologies CYB 220 Brandon Meadows 10/14/2023
A. Explain how you are employing one of the Fundamental Security Design Principles to inform your recommendation The strategy I have for developing the security system will be based on the concept of layering as its primary organizational principle. The practice of shielding oneself with many layers of defense is referred to as "layering." These forms of protection can be implemented in either the hardware or the software of a system, and they consist of several checks and balances that ensure The overall system is secure from a variety of different points of view. These protections can be implemented in either the hardware or the software of a system (Tjaden, 2015). Layering will be applied in this circumstance by deploying many intrusion/detection systems around the company network. B. Justify a recommended network protection approach. Describe how you balanced effectiveness, cost, and technical capabilities to select the network protection technology I recommend installing a mixture of NIPS, NIDS, and IDS across the network is the network security method I recommend. In a DMZ at each location, a NIPS appliance with an incoming and outgoing firewall would be installed. I would also
implement NIDS-capable routers at each site. I would install intrusion prevention software on each store's principal server to increase security. The cost- effectiveness ratio is rarely acceptable to all parties. It is asserted that the corporation would prefer to spend in marketing rather than IT infrastructure, however no monetary sum is specified. Given the severity and relevance of this company's network security challenges, it seems inexplicable that the recommended solution would fall short of offering complete protection due to restricted resources. Adoption of a solution has a steady cost in terms of ROI (return on investment) or savings on lost items, however inventory loss is dynamic and continuing, resulting in an organization-wide cost that is endless. Given that the company now employs IT specialists at each location, future training costs should be seen as minimal. C. Recommend resources (e.g., organizational assets, workforce allocation, policies/procedures, hardware) that are necessary for implementing or monitoring your chosen network protection approach. These resources should optimize the technology or maximize organizational resources. Explain your recommendation using an adversarial mindset or systems thinking approach I believe having an existing network infrastructure is a necessary organizational asset for the delivery of the stated solution; if this asset were not there, the costs associated with the project would rise. In addition, the development and ongoing monitoring of an IDS/IPS system would unquestionably benefit from the presence of a centralized and well-established IT department at the main headquarters, as well as IT professionals located at each location. To develop
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help