This assignment will help you analyze how a detailed background of network concepts, standards, and protocols is important in breaking down “defense in-depth.” Before beginning, ensure you have watched all of the following videos about networking
This assignment will help you analyze how a detailed background of network concepts, standards, and protocols is important in breaking down “defense in-depth.”
Before beginning, ensure you have watched all of the following videos about networking that were provided in this module’s Reading and Multimedia folder:
- Introduction to Networking: Network Fundamentals Part 1
- Cabling Devices: Network Fundamentals Part 2
- How the OSI Model Works: Network Fundamentals Part 3
- How IP Addresses Work: Network Fundamentals Part 4
- IP Addressing in Depth: Network Fundamentals Part 5
- TCP/IP Model (Internet Protocol Suite): Network Fundamentals Part 6
Searching for Information
Research the concept of “defense in depth” to identify how information technology solutions can be broken into different layers; you will also need to analyze how to enhance security at each of those layers within an organization.
At a very high-level, the concept of developing defense in depth means that an organization has a variety of defensive measures that address security concerns at the different layers. For example, organizations will have firewalls that block/filter network communications at the perimeter level. These organizations may implement firewalls at the endpoint level as well to manage communication at the host level; however, they will implement anti-virus solutions at the host level. This example will definitely expand much more when you consider all the communication layers and the network architecture.
![](/static/compass_v2/shared-icons/check-mark.png)
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Concepts of Database Management](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
![Prelude to Programming](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
![Sc Business Data Communications and Networking, T…](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)