Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
You are newly hired as a technology associate in the information systems department at the fictional company Corporation Techs in Dallas, Texas. Corporation Techs is an information technology (IT) services organization supporting a number of clients in the Dallas/Fort Worth area. Its a Wednesday, a dull day where you have nothing much exciting to do. Suddenly, you get a call from your manager. He appreciates the work you have been doing so far and thinks that you have the ability to take on more challenging work. To complete challenging tasks, you need to become familiar with the tools of the trade. You need to learn about a new packet analyzer called NetWitness Inspector.
–
Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
You are working with your manager on a project. You are attempting to determine the best approach for securing inbound traffic from the Internet to various application servers on the clients local area network (LAN). You would like to select a strategy that gives the client significant control over user accessibility. You would also like to ensure that all data passing into your clients network are properly evaluated before access is granted. Integrity of data is the top priority; however, your client has a limited budget for deployment.
Using the information presented above, discuss which of the following firewall security strategies would be a good fit for your clients network environment.
Firewall Security Strategies
- Security through obscurityBy configuring systems in a way that does not follow normal patterns and is not easily understandable, security through obscurity can be obtained. By utilizing abnormal configurations, the probability of exploitation is reduced and a level of protection is obtained. Administrators seek security through obscurity by performing one or more of the following actions:
- Modification of default ports
- Spoofing of banners or headers
- Utilization of extraordinary long uniform resource locators (URLs)
- Utilizing uncommon protocols or operating systems
Keep in mind that this strategy may instill a false sense of security. Because attackers have multiple methods to scan against system configurations, utilizing this as the only security mechanism is like using nothing at all.
- Least privilegeThis strategy requires that each user or group that requires access to resources be explicitly granted permission. Because all resource access would be denied by default, each individual access need would have to be individually addressed. When least privilege is employed, there is often a dramatic increase in administrative overhead as a direct result. Least privilege is preferred for administrative scenarios.
- SimplicityThis strategy reinforces that the selected solution should remain simple. By retaining a simple solution, the potential for error in configuration, bugs, or other problems is reduced.
- Defense in depthThis strategy emphasizes on a layered approach. The use of multiple safeguards ensures that no system that represents a single point of failure could be breached. The characteristics of a defense-in-depth strategy are the following:
- Public networks are separate from private networks
- Multiple security controls are implemented
- Redundant security controls are implemented
- Consists of multiple tiers or layers
- Diversity of defenseDiversity of defense is similar to defense in depth in terms of layered approach. The distinction is that diversity in defense represents each of those layers with a different technology.
- Choke pointA choke point forces all traffic through a single pathway to ensure that security checks take place. This strategy is only valuable if the choke point is hard to bypass or skip around. Additionally, because all traffic is funneled into the single pathway, issues regarding bandwidth constraints or performance problems may arise.
- Weakest linkBecause all environments have a weakest link, this strategy subscribes to the continuous process of identifying the weakest link and eradicating it.
- Fail-safeFailure is destined to occur on security systems, and when it does a strategy for handling the failure should already be in place. When a failure occurs and a fail-safe is triggered, there are two possible reactive choices, as follows:
- Fail-open:Security systems fail, but to maintain availability, network communications are allowed to continue.
- Fail-closed:When security fails, to retain security and integrity, the network pathway is closed and traffic flow does not continue.
- Fail-safe: This is a strategy that is most often used in conjunction with other strategies.
- Forced universal participationWhen it comes to selecting a security strategy, it is important that all users and groups involved in its execution are supportive. End users are a potentially exploitable key for an attacker to utilize to gain unauthorized access to a network environment. When end users intentionally or inadvertently do not follow security principals, an attacker can more readily cause a breach in the security systems. A good example of this is when users write down their user name and password information and store them in plain sight. Without buy-in to the selected security strategy and a commitment to following protocol, there is a higher probability for breach. Selecting and following through with the implementation of a forced universal participation strategy will ensure that security policies are observed.
Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Discuss methods for improving virtual private network (VPN) performance and establishing stability of VPN connections. After discussing all of the items, choose 2 performance and 2 stability factors, and then write short summaries of the solutions.
- Summarize your thoughts, and justify your position.
Reviews
There are no reviews yet.