This assignment will help you analyze how a detailed background of network concepts, standards, and protocols is important in breaking down “defense in-depth.” Before beginning, ensure you have watched all of the following videos about networking
This assignment will help you analyze how a detailed background of network concepts, standards, and protocols is important in breaking down “defense in-depth.”
Before beginning, ensure you have watched all of the following videos about networking that were provided in this module’s Reading and Multimedia folder:
- Introduction to Networking: Network Fundamentals Part 1
- Cabling Devices: Network Fundamentals Part 2
- How the OSI Model Works: Network Fundamentals Part 3
- How IP Addresses Work: Network Fundamentals Part 4
- IP Addressing in Depth: Network Fundamentals Part 5
- TCP/IP Model (Internet Protocol Suite): Network Fundamentals Part 6
Searching for Information
Research the concept of “defense in depth” to identify how information technology solutions can be broken into different layers; you will also need to analyze how to enhance security at each of those layers within an organization.
At a very high-level, the concept of developing defense in depth means that an organization has a variety of defensive measures that address security concerns at the different layers. For example, organizations will have firewalls that block/filter network communications at the perimeter level. These organizations may implement firewalls at the endpoint level as well to manage communication at the host level; however, they will implement anti-virus solutions at the host level. This example will definitely expand much more when you consider all the communication layers and the network architecture.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps