Sei sulla pagina 1di 3

Julie Angley IT 255 Unit 8 Assignment 2 Worksheet Date Submitted: 02/27/2012 Mr.

Siddiqui

IT255: Unit 8 Network Security Applications and Countermeasures


Instructions: Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions: Where does the countermeasure belong in the seven domains of a typical IT infrastructure? What CIA functions does the countermeasure provide?

Provide your answers in the table below.

Network Security Applications and Countermeasures Ethical hacker Intrusion detection system/intrusion prevention system (IDS/IPS) Access controls User

Domains

CIA Function

Integrity Integrity

LAN-to-WAN Workstation Workstation LAN LAN-to-WAN WAN Remote Access System/Applications

Confidentiality Integrity

Failover server

LAN System/Applications

Availability

Automatic updates

Workstation LAN System/Applications

Integrity

Cryptography

Workstation LAN LAN-to-WAN WAN Remote Access System/Applications

Confidentiality Integrity

ITT Educational Services

Page 1

Julie Angley IT 255 Unit 8 Assignment 2 Worksheet Date Submitted: 02/27/2012 Mr. Siddiqui

IT255: Unit 8 Network Security Applications and Countermeasures


Network Security Applications and Countermeasures Data backups Workstation LAN System/Applications Logon rights Workstation LAN LAN-to-WAN System/Applications Computer cluster LAN System/Applications Firewalls LAN-to-WAN System/Applications Proxies Workstation LAN System/Applications Antivirus scanners Workstation LAN Remote Access System/Applications Integrity Confidentiality Confidentiality Confidentiality Confidentiality Availability Domains CIA Function

As a reminder, the seven domains of a typical IT infrastructure include the following domains: User domain: Actual users Workstation domain: Workstations, laptops, and end-point devices, such as smartphones and printers LAN domain: Physical and logical LAN technologies100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN technologiesused to support workstation connectivity to the organizations network infrastructure LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS

ITT Educational Services

Page 2

Julie Angley IT 255 Unit 8 Assignment 2 Worksheet Date Submitted: 02/27/2012 Mr. Siddiqui

IT255: Unit 8 Network Security Applications and Countermeasures


WAN domain: Routers, circuits, switches, firewalls, gateways, and equivalent gear at remote locations, sometimes under a managed service offering by the service provider Remote access domain: Virtual private networks (VPNs), laptops with VPN software, and secured socket layer/VPN (SSL/VPN) tunnels System/Application domain: Hardware, operating system software, database software, client/server applications, and data that are typically housed in the organizations data center and computer rooms

Representation of the Seven Domains of a typical IT Infrastructure

ITT Educational Services

Page 3

Potrebbero piacerti anche