In this section, students will address each of the following.
Define the physical security requirements, propose a solution, and justify the solution.
At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
- Define the physical security requirements, propose a solution, and justify the solution.
o At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
- Define the mobile device security requirements, propose a solution, and justify the solution.
o Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.
- Define the perimeter defense requirements, propose a solution, and justify the solution.
o Students should consider the different types of attacks, security appliances, and the network configuration to implement.
- Define the network defense requirements, propose a solution, and justify the solution.
o Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.
- Define the host defense requirements, propose a solution, and justify the solution.
o Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.
Answer preview
In order to protect itself from the external network, the institution will make use of the best option available. The first thing to do is to several layers of defense since no choice is 100% effective. The use of a firewall will help limit who accesses the network. Traffic that is not allowed will be blocked before it inside the network, and at the same time, they should be able to scan incoming and outgoing traffic to identify any suspicious behavior. Routers and load balancers will also be used to provide more security. Each option used must be configured correctly and must have the most recent software.
Justification
Attacks to the network can come from anywhere at any time; it is, therefore, essential to ensure that there is sufficient protection. Protecting the network at the entry and exit points will provide the first line of defense against attackers. The rapid technological changes should be incorporated for maximum security. Segmentation will also make it possible to protect the network effect as opposed to blanket coverage. The multiple layers make it impossible for the attacker to gain access into the network.
[1466 Words]