home / study / engineering / computer science / computer science questions and a
ID: 3916202 • Letter: H
Question
home / study / engineering / computer science / computer science questions and answers / assignment requirements ken 7 windows limited has added several new servers and workstations ... Question: Assignment Requirements Ken 7 Windows Limited has added several new servers and workstations to t... Assignment Requirements Ken 7 Windows Limited has added several new servers and workstations to the Ken 7 domain to support the new enterprise resource planning (ERP) software. They have also added many internal users and plan to allow access from remote users to their internal network resources. Ken 7 Windows Limited needs additional network controls to protect their growing network. Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend possible new controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security. Summarize your network security controls in a Word document with more then 500 and submit it to your instructor. You must provide rationale for your choices by explaining how each control makes the environment more secure.
Explanation / Answer
Solution :-
Many organizations struggle to architect and implement adequate network infrastructures to optimize network security monitoring.This challenge often leads to data loss with regards to monitored traffic and security events, increased cost in new hardware and technology needed to address monitoring gaps, and additional Information Security personnel to keep up with the overwhelming number of security alerts. Organizations spend a lot of time,effort, and money deploying the latest and greatest tools without ever addressing the fundamental problem of adequate networksecurity design.
Defence in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilising the strategy of defence in depth will reduce the risk of having a successful and likely very costly attack on a network.
A multi-layered defence in depth strategy helps organizations address many of the most common causes of breaches. Mobile endpoints are susceptible to malware and malicious attacks,particularly when devices are used outside the safe confines of the immediate corporate network. And even as the Bring Your Own Device(BYOD) and the Internet of Things (IoT) trends increase the number of mobile endpoints in corporate settings, defence in depth –network and security components providing redundancy and constant communication – lessens the chance these devices will become exploitable vulnerabilities.
The first step of a defence in depth strategy to protect against network breaches should be to establish proper access control systems. Before granting access rights, an enterprise’s system should check whether users have the correct device identities(software, hardware and network attributes) and user identities(each individual attribute of a user). They should also have to meet certain role requirements. For example, a network could grantaccess only to employees using approved devices who are inmanagerial positions at the company and using secure networkconnections.
Network and security components must be able to communicate sothat if an attacker penetrates one system, others can respondimmediately to take preventative measures. IF-MAP (www.if-map.org)is a robust protocol that enables information sharing between desperate systems. If an unauthorized user is able to break through these first layers of defence, perhaps by stealing user credentials, an enterprise can deprovision devices via a centrally managed VPN or revoke remote access rights. Both of these actions could be triggered as soon as a breach is detected. As this example shows, defence in depth does not create an impenetrable cybershield. Rather, it minimizes risk and keeps organizations one stepahead of cybercriminals.
No single security measure can adequately protect a network;there are simply too many methods available to an attacker for thisto work. The script kiddie, a skilled attacker and trusted userhave some methods in common, but each presents unique problems to asecure network. For instance, a firewall does not provide anyprotection from an insider but should be a significant hurdle foran attacker from the outside. Likewise, policies and procedures do not mean anything to an attacker from the outside but should bepart of the plan to protect a network from insiders. Implementing a strategy of defence in depth will hopefully defeat or discourageall kinds of attackers. Firewalls, intrusion detection systems,well trained users, policies and procedures, switched networks,strong password and good physical security are examples of some ofthe things that go in to an effective security plan. Each of thesemechanisms by themselves are of little value but when implemented together become much more valuable as part of an overall security plan.
Please Upvote my answer :)
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.