Question

Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:

Where does the application or countermeasure belong in the seven domains of a typical IT infrastructure? An application or countermeasure may span two or more domains.

What confidentiality, integrity, and availability (CIA) function(s) does the countermeasure provide?

Provide your answers in the table below.

Network Security Applications and Domain(s) CIA Function(s) Countermeasures Intrusion detection system/intrusion prevention system (IDS/IPS) Cryptography Logon rights Firewall WPA Antivirus scanner Virtual private networlk MAC address filtering

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Each listed countermeasure belong within the seven domains of a typical IT infrastructure is explained in following manner NeWorkstation Integrity Virtual Private Network System/Applications Confidentialit MAC address filtering IntegrityThe seven domains of atypicalIT nfrastnce the following domains User Domain: Actual users Workstation Domain: Workstations, lLAN Domain LAN-to-WAN Domain WAN Domain Server Firewall User Domain Domain Computer Hub Router Firewall Remote Access Domain

Add a comment
Know the answer?
Add Answer to:
Given the network security applications and countermeasures in the first column of the table below, explore answers to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT