Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

q1: Explain how clear desk and clear screen policy is important to protect the c

ID: 3683494 • Letter: Q

Question

q1: Explain how clear desk and clear screen policy is important to protect the confidentiality of company-owned data.

q2: What is the difference between Data Replication and Data Backup? Where Backed-up or replicated data should be stored?

q3: What is the advantages and disadvantages of default deny model and default allow model? Cite at least 3 properties of each model.

q4: Firewall rule sets use source IP addresses, destination addresses, ports, and protocols.

a . Describe the function of each.

b. What is the purpose of the following rule? Allow Src=10.1.23.54 dest=85.75.32.200 Proto=tcp 21

c. What is the purpose of the following rule? Deny Src=ANY dest=ANY Proto=tcp 23

Explanation / Answer

1)The Purpose of the Clear Desk/Clear Screen Policy is to set guidelines which reduce the risk of a security breach, fraud and information theft caused by information being left unattended in the organization`s premises.

Device/document has been removed by management in line with the requirement to operate a clear desk policy. This policy is in place to ensure that our assets are protected, but it’s the personal data they hold that is of most value to criminals. The repercussions of any loss of personal data could be very serious for our organisation, our reputation and for you.

2)

a)Data Backup involves making a copy or copies of data...

Data Replication is the act of copying and then moving data between a company’s sites.

B) Data Backup requires a tape library and some place to store archived tapes.

  Data Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs

c)Data Backup is typically used for everything in the enterprise, from critical production servers to desktops

  Data Replication is often used for mission-critical applications that must always be up and running

d)Data Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time ..

  Data Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images...

3)

Default-deny policy. The firewall administrator lists the allowed network services, and everything else is denied.

Default-allow policy. The firewall administrator lists network services which are not allowed, and everything else is accepted.

There are advantages and disadvantages to both default permit and default deny. The primary advantage of default permit is that it is easier to configure: you simply block out the protocols that are "too dangerous," and rely on your awareness to block new dangerous protocols as they are developed.

With default deny, you simply enable protocols as they are requested by your users or management. Any protocol that isn't being used by your organization might as well be blocked.

Neither default permit nor default deny is a panacea. With both policies, you can create a firewall that is either secure or unsecure, by permitting "dangerous" protocols.