Common risks, threats, and vulnerabilities Essay

1. What are some common hazards. menaces. and exposures normally found in the LAN-to-WAN Domain that must be mitigated through a superimposed security scheme? A superimposed security scheme will embrace Rouge protocols such as Bit excavation and P2P. Unauthorized web scanning and examining. and unauthorised entree to the web. 2. What is an Access Control List ( ACL ) and how is it utile in a superimposed security scheme? An ACL is a Control list which will let or deny traffic or devices based on specifications defined in the ACL. This ACL by and large is applied and configured on Firewalls. It is utile in a superimposed security attack because from an External point of view it become the first line of defence when hosts attempt to link to the web.

3. What is a Bastion Host? Provide an illustration of when a Bastion Host should be used and how. A “Bastion Host” is a host that is minimally configured package firewall incorporating merely necessary software/services. These are besides referred to as bare metal or “lite” and is managed to be overly secure through a minimalist attack. All traffic coming is directed to the Bastion or “screened host” . Outbound traffic is non sent through it. The most common menace to the Bastion Host is to the operating system that is non hardened with extra security applications.

4. Supply at least two illustrations of how the enclave demand to put a firewall at the margin can be accomplished. a. Puting a firewall between two routers and another firewall before a DMZ would be the best demand pick to utilize 5. What is the difference between a traditional IP Stateful Firewall and a Deep Packet Inspection Firewall? a. IP Stateful firewall review takes topographic point in bed 4. when traffic efforts to track the firewall a requested a beginning port and a finish port brace become portion of the session leting the beginning to have information. Stateful review firewalls solve the exposure of allowing all the high numbered ports by making a tabular array incorporating the outbound connexions and their associated high numbered port ( s ) . b. Firewalls utilizing deep package review provides sweetenings to Stateful firewalls’ Stateful firewall is still susceptible to assail even if the firewall is deployed and working as it should be. By adding application-oriented logic into the hardware. basically uniting IDS into the firewall traffic. Deep Packet Inspection uses an Attack Object Database to hive away protocol anomalousnesss and onslaught traffic by grouping them by protocol and security degree.

6. How would you supervise for unauthorised direction entree efforts to sensitive systems? Acl’s and audit logs can be leveraged to corroborate which station is trying to do the unauthorised connexion. 7. Describe Group ID ( Vulid ) : V-3057 in the Network IDS/IPS Implementation Guide provided by DISA? A direction waiter is a centralised device that receives information from the detectors or agents 8. What is the significance of VLAN 1 traffic within a Cisco Catalyst LAN Switch? Describe the exposures associated if it traverses across unneeded bole. VLAN1 traffic will incorporate the STP or crossing tree traffic. CDP traffic. and Dynamic trunking traffic to call a few. If unneeded traffic traverses the bole it could do the switch instability doing it to travel down or go inoperable.

9. At what logging degree should the syslog service be configured on a Cisco Router. Switch. or Firewall device? Syslogs traps should be configured at degrees 0-6. Loging Level 2 10. Describe how you would implement a superimposed. security scheme within the LAN-to-WAN Domain to back up authorised remote user entree while denying entree to unauthorised users at the Internet ingress/egress point. To implement a superimposed security scheme for distant user entree. we would get down with an application based login. such as a VPN -SSL hallmark so pair it with LDAP on a radius or Tacacs+ service. LDAP is bound to Active directory which will leverage Role based entree controls to look into group permissions.

11. As defined in the Network Infrastructure Technology Overview. Version 8. Let go of 3. describe the 3 beds that can be found in the DISA Enclave Perimeter layered security solution for Internet ingress/egress connexions ( i. e. . DMZ or Component Flow ) . 3 types of beds found in the Enclave Perimeter Component Flow include the Network layer security. Application layer security and security of the existent applications themselves. 12. Which device in the Enclave Protection Mechanism Component Flow helps extenuate hazard from users go againsting acceptable usage and unwanted web sites and URL links? The Web Content Filter

13. True or False. The Enclave Protection Mechanism includes both an internal IDS and external IDS when linking a closed web substructure to the public Internet. True. it is required to hold external IDS every bit good as internal IDS. Requirements include holding a firewall and IDS in between the
cyberspace confronting router and the internal. “premise” . and router. 14. True or False. Procuring the enclave merely requires perimeter security and firewalls. False. procuring the enclave includes a superimposed firewall attack both on the interior and outside of the web. Sensitive informations can be secured from other sections of the internal web ( internal ) every bit good as Internet links ( external ) . 1

5. What is the primary aim of this STIG as is relates to web substructures for DoD webs? STIG. or Security Technical Implementation Guide. is an intended usher to diminish exposures and potency of losing sensitive informations. The usher focuses on web security. giving security considerations for the enforced web. The STIG besides covers the degree of hazards and the associated acceptable degrees to said hazards.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Nursing
thank you so much
Customer 452749, June 10th, 2021
Criminal Justice
The paper was not accused of plagiarism and was written very well. I will let you know the grade once it is graded. Thank you
Customer 452671, April 26th, 2021
Business and administrative studies
Excellent work ,always done early
Customer 452773, February 21st, 2023
Human Resources Management (HRM)
excellent job
Customer 452773, June 25th, 2023
Business and administrative studies
Thanks
Customer 452773, March 3rd, 2023
English 101
great summery in terms of the time given. it lacks a bit of clarity but otherwise perfect.
Customer 452747, June 9th, 2021
Human Resources Management (HRM)
excellent
Customer 452773, July 11th, 2023
Business and administrative studies
Perfect
Customer 452773, February 23rd, 2023
Business and administrative studies
always perfect work and always completed early
Customer 452773, February 21st, 2023
Business and administrative studies
excellent job! got an A, thank you
Customer 452773, May 24th, 2023
Managerial Accounting & Legal Aspects of Business ACC/543
excellent work
Customer 452773, February 7th, 2024
BUSINESS LAW
excellent job made a 93
Customer 452773, March 22nd, 2023
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp