network administration

Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is … Read more

Recap

Week 16 Discussion — Recap For your initial post, discuss the topics in the list below. Write a couple of sentences for each.  Attached is the thesis used. Q1. Why did you think it was important to study/research this topic or conduct this project? Q2. What are other studies in your literature review suggesting about this topic? … Read more

network security layers

Deny by default/allow by exception assumes that all traffic is potentially malicious or at least unwanted or unauthorized. Everything is prohibited by default. As benign, desired, and authorized traffic is identified, an exception rule grants it access to the network. Allow by default/deny by exception assumes that most traffic is benign. Everything is allowed by … Read more

Chip Set Security

Week 15 Discussion – Chip Set Security For your initial post,  discuss the topic below. Respond to posts from other students. Supply Chain Security Describe security vulnerabilities for manufacture and distribution of chipset supplies

network security layers

Data backups are extremely important. Data ups should be kept off site and secure. Research a backup solution, datacenter or cloud based, and explain the available options, cost if possible, advantages and disadvantages, and if this is for personal or corporate use. 

network security layers

A best practice is to thoroughly document the lifespan of a firewall. A firewall implementation procedure should prescribe the systematic process to install and configure a firewall properly. Anytime the firewall is modified, the documentation should be updated accordingly. Answer the following question(s): Assuming you would rarely need to reinstall a firewall, why do you … Read more

network administration

The Open Web Application Security Project (OWASP) is a nonprofit foundation dedicated to helping people understand and improve the security of software. One of their projects it the OWASP Top Ten Web Application Security Risks found https://owasp.org/www-project-top-ten/Links to an external site. . For this discussion you will choose one of the Top Ten Risks and give … Read more

Network layers

In the event of an unknown zero-day attack, an intrusion detection system (IDS) might not be able to detect the attack and therefore fail to alert the administrator. Any failure to detect an attack is called a false negative. When alarms are not going off, it’s common to assume that no malicious events are taking … Read more

network security layers

LAN Version Subnetting Large organizations often consist of multiple departments that require logical networks to be created across the physical network. Two main ways to create logical networks are virtual LANs (VLANs) and subnetting. Answer the following question(s): In what situation would you create logical networks with VLANs rather than subnetting? Why?

Meta-Data

Week 13 Discussion – Metadata For your initial post, discuss the two topics below. Respond to posts from other students. Metadata collection Compare Government and the Private Sector policies for collecting and using metadata Describe how metadata might be used to protect future national security, and for boosting retail commerce and economic growth.