Touchstone Task 4_ Planning Network Security Measures Questions

docx

School

Portland Community College *

*We aren’t endorsed by this school

Course

212

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by BaronRoseGuineaPig68

Report
Name Date: Touchstone Task 4: Planning Network Security Measures Review the scenario and client expectations about Greenfield Properties. Based on the information provided by the client, answer the following questions in 2-4 sentences each. Be sure to explain your answers in detail. What types of firewall systems should be used? Explain your choice. (Ref: Firewalls Technologies and Firewalls Features and Functions ) Network-based firewalls are a good option for Greenfield Properties. This is so that the private network is shielded from public networks by this kind of firewall. Furthermore, the network-based kind of firewall is crucial as it is made to safeguard the system's entire computer cluster rather than simply one individual machine. What switch or router settings can be used to secure network access? Suggest one method and briefly explain its benefit. (Ref: Security Filtering - Access Control List and VPN Using the secure sockets layer (SSL) is one way to secure network access. Because SSL guarantees safe communications between a web browser and a web server, its adoption on a network is imperative. SSL is a component that is independent of services and may secure a variety of network applications. SSL is therefore necessary since it enforces PCI compliance, increases data security, and verifies user identification. Which authentication method do you recommend for user sign-in to the network? Explain your recommendation. (Ref: User Authentication Methods ) For network user sign-in, I advise using the Remote Authentication Dial-In User Service (RADIUS). Dial-up requests are just one kind of link that users can use to validate their identity using RADIUS, an authentication service. Before submitting authentication requests, the RADIUS server configures connections and saves the usernames and passwords of its clients. I suggested that RADIUS be implemented on the network as an authentication method because it requires that private client information be kept in a central database. What password policies would you recommend enforcing? Explain your recommendation. (Ref: User Account and Password Security ) I suggest implementing automatic account lockout and password expiration as password
policies for managing daily operations at Greenfield properties. When users neglect to log out of their accounts, an automated account lockout policy is in place to stop hackers from breaking into the network. This feature keeps a possible hacker from running an automated script to guess account passwords. The length of time a password can be used is determined by its expiration policy; for example, it may be used for 30 to 45 days. In this sense, the number of login attempts is frequently the limit on the grace period during which consumers must reset their passwords. How will the company protect physical access to the servers? Suggest two methods and briefly explain the benefits of each one. (Ref: Network Physical Security ) Video surveillance and access control vestibules are the two strategies the business can employ to safeguard the physical access to its servers. Installing IP cameras or closed-circuit television (CCTV) to monitor organizational spaces is a common practice in video monitoring. The access control vestibule, on the other hand, has two doors. When someone tries to enter this room through the first door, they are first authenticated. When they try to enter through the second door, they are then subjected to another verification process. A guard who verifies the identity of the individual in question visually may be used at the second door. What types of anti-malware software should be deployed? Explain your choice. (Ref: Anti- Malware/Anti-Virus Programs ) Host- and server-based anti-malware are the two main types of anti-malware software that ought to be installed at Greenfield sites. Even though host-based anti-malware requires frequent updates, it would grant the company complete control over the entire process. However, because it uses less processing power, gives access to the most recent malware data, and does away with the need for regular software updates, server-based anti-malware may also be utilized.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help