Explain how CIA (triangle) is at help in network security.
Security in Practice
WRITE THIS ESSAY FOR ME
Tell us about your assignment and we will find the best writer for your paper.
Get Help Now!Task 1: CIA.
Step 1: Explain how CIA (triangle) is at help in network security.
Step 2: Explain this terms.
- Make a list of common security terms
- Describe typicaly network security zones
Step 3: Describe this different network topologies.
If you illustrate your description use your own drawings.
- CAN
- WAN
- Datacenter
- SOHO
- LAN
Task 2: Human a major risk in IT security.
Step 1: Read the web page above and explain.
- How is it possible to train staff detecting social engendering attacks?
- Research five other social engineering attacks!
- Suggest a preventive action.
Step 2: Describe the difference between DoS and DDoS attack.
- Explain and write an example drawing of the two attacks methods.
Step 3: Find malware detection tools and try them on your computer.
- Describe this tools they functionality and how they can find malware!
Step 4: Research recently attacks on It and Networks
- Find reliable sources and add the URL’s to your document.
- Find the methods attackers used and possible consequences of a successful attack.
Step 5: Researching Network Security Audit Tools and Attack Tools
- Research network security audit tools.
- Research network attack tools
- Select a tool from each group and develop a report for presentation to the class.
- List some of the tool you identified in your search and explain brief functionality.
Task 3:
Step 1: Explain difference between Stream ciphers and Block ciphers
and list them as much as you can.
- Which one is used by Cisco?
- what is its name?
- Explain its parameters.
Step 2: Explain difference between Symmetric and Asymmetric
algorithm with example.
- Which Asymmetric algorithm is used by Cisco?
- Explain its parameters.
Step 3: Find different types of CA and explain them in one paragraph.
Task 4:
Step 1: Explain all steps to establish a secure connection using IPsec.
Step:2 There is a challenge between the level of security and the
efficiency of the system. Explain the issue and discuss about
and conclude with your opinion/solution regards this problem.
Task 5:
Part 1: Protecting Layer 2
Step 1: Explain best practice against this treats:
- MAC Spoofing
- Protect against loop
- DHCP spoofing
- Man-In-the-Middle attack
Part 2: Securing management traffic.
Step 1: Management traffic.
- Explain what management traffic is and protocols used for this purpose!
- What is Cisco best practice to secure the management traffic?
- Can you add some other security measures to secure management? (use google).
- How can we ensure password expiration policy to work automatically?
- How would you prevent someone who reads our Cisco config see line, con and aux
password?
- What AAA service would you prefer in a windows environment securing Cisco devices?
- What benefits does Tacacs + provide compared to Radius?
- How can you secure logging in case of a Cisco device reboot?
Step 2: SNMP is used among others to monitor network devices
- What versions of snmp is preferred?
- Why would you use this version?
Task 6:
Part 1: IPV6.
Step 1: Explain briefly differences between IPv4 and IPv6.
Step 2: IPv6 enabled networks
- What IP addresses are routable in IPv6?
- What IPv6 threat do you know? (If you don’t know any google some)
Part 2: Protecting routing protocols
Step 1: Explain best practice:
- Protecting RIP
- Protecting OSPF
- Protecting EIGRP
- Protecting BGP
Task 7: Firewall fundamentals.
Step 1: What properties does a good firewall possess?
Step 2: Explain brief firewall methodologies and functionality of the feature!
Designing a firewall with complete policies is a challenging and demanding task.
Step 3: Write consideration regarding design in firewall rules and argue about why
each of them has value for security.
Step 4: Give an example of ACL rule. It has some requirements:
- It controls access to a server placed in DMZ.
- IP is 192.168.210.10/30
- Traffic allowed to the server from internet is SMTP, HTTPS, SSH
- SMTP traffic is only allowed from smtp.online.no
Task 8: IPS vs IDS.
- Discuss the differences and advantages and disadvantages between IDS/IPS.
- In a medium security demanding company what type of intuition system would you implement
and why?
- The company has an in-house server park with total traffic about 3Gb/s and 200 vpn users.
Find alternatives from Cisco that could protect adequate against treats.
- What “sensors types” do we have in IPS/IDS systems.
Task 9: Good firewall
Step 1:
- Explain what properties a good firewall should possess!
- Do you know any limitation of firewalls?
- What types of threats can a firewall mitigate?
Step 2: ASA Firewalls
- Explain in your own words how all ASA services and features work
- The concept of zone-based firewalling is to help keep overview over security zones.
What are the concept of zone-based firewalling? (make a detailed explanation)
Step 3: IPS/IDS
The new border in your company remediates the security policy for them to fully understand
The functionality of your Cisco ASA 5506. Explain briefly the following items:
- how IPS/IDS works!
- what services is possible!
- and you should recommend 3 features to be implemented as a security protection
against network threats.
Introducing our Online Essay Writing Services Agency, where you can confidently place orders for a wide range of academic assignments. Our reputable homework writing company specializes in crafting essays, term papers, research papers, capstone projects, movie reviews, presentations, annotated bibliographies, reaction papers, research proposals, discussions, and various other assignments. Rest assured, our content is guaranteed to be 100% original, as every piece is meticulously written from scratch. Say goodbye to concerns about plagiarism and trust us to deliver authentic and high-quality work.