SlideShare a Scribd company logo
1 of 2
Download to read offline
American University What Areas Are Concerning when Securing a
Network HW
Question DescriptionRefer to scenario for additional information.In preparation for your
network design project, discuss with your classmates ideas for addressing the security
vulnerabilities in the network design. In your discussion, address the following: What
challenges will need to be addressed with the U.S. Navy project described in your
scenario?What types of vulnerabilities need to be addressed in the design?Where might
there be points of failure in the design?What areas concern you about securing the
network?What steps would you recommend to overcome those concerns?Also respond to
the two discussion below.A few challenges that need to be addressed with the U.S. Navy is
how quickly they want this initial design to be completed. Remember we do not have our
security clearance just yet and that might hold us back in being able to handle certain
equipment and have access to certain types of data. Another issue would be how I would I
create a network design that would conform to the Navy’s Standards. And finally another
issues to be taken up is why in the first place internal network and external Department of
Defense suppliers are not “considered” secured.Vulnerabilities that should be looked at in
the design are Hardware and Software Failures and Errors, with over 260 hosts with
additional hardware of printers and base design plotters we could run into equipment that
has flaws already in them (Whittman, Mattford). These flaws could result in downtime of
equipment and failure to protect network traffic (Whittman,Mattford). Another
vulnerability to look at is the location of where this network design will implemented, will
this location be where lightning and flooding frequently take place? A concern that I had for
this project, is that I seem to be the only person with this security design, how many other
people would I would be able to speak with about this plan and are available to assist me.
Would I be able to consult with a DOD or Navy approved consultants. A suggestion I would
think to have is a security team would be a useful tool to have on standby. Another concern
that I had was what other assets I had to work with, per Eric Dosal to remedy this concern is
to conduct a review of all the assets you have “and identify all the various platforms they
run on” (Dosal).A point of failure that I worry about is the security policy with the US Navy,
depending on policy my initial design might fail altogether if that it does not comply with
DOD or Navy policies.Whitman,Mattford (2018) Principles of Information Security, Sixth
Edition. Retrieved from https://ebooksbvd.my-education-
connection.com/read/9781337470407/copyright_xhtml The most important challenge that
needs to be addressed with the U.S. Navy project is the level of security for all the different
hosts that will be accessing the databases. Giving each particular department the correct
clearance level, one would need to utilize the Least Privilege Principle by beginning here
with the security this sets up the system to where the clearance needs to be at (American
InterContinental University [AIU], n.d.). The other challenge will be making sure that the
people logging into the secure top-secret areas know the procedures to logging on and off
before going to the nonsecure areas of the system. Setting up the VPN so that the captain in
charge and his staff with the project have a way to securely connect from remote places that
way they are able to tunnel their activity in a more secure manner (IVPN, n.d.). The
vulnerabilities that the design will encounter would be setting the acquisition department
and the personal department up so they can access to the secure internal network and
external Department of Defense suppliers and not have access to the top-secret areas of the
system but allowing the other departments access to those areas. To negate the
vulnerabilities that will be encountered are thorough investigations into the staff that will
have access to the systems, checkpoint security stations to the work areas, and thorough
research into the system to better know what setup is already and what it is lacking. The
points of failure will more than anything else be attributed to staff error, outsiders trying to
make access to the system, and lapses of judgment by everyone involved. There need to be
ongoing training and refresher courses on security measures to keep security at the
forefront of everyone’s minds. All the areas concern me because they are all important to
the security of the facility, hopefully, I will have the know-how to combat the obstacles that
arise in the project. To overcome these concerns, I plan on doing thorough research into all
the areas and try and patch the holes in the system before someone else finds them and
trouble arises.ReferenceAmerican InterContinental University. (n.d.). Security Trends and
Concepts: Security Trends and Concepts [Multimedia presentation]. Retrieved from
American InterContinental University Virtual Campus, ITCO361-1905A-01:
https://mycampus.aiu-online.comIVPN. (n.d.) What is a VPN tunnel?. Retrieved from
https://www.ivpn.net/what-is-a-tunnelDosal, Eric (2018) 5 common Network Security
Problems and Solutions . Retrieved from https://www.compuquip.com/blog/5-common-
network-security-problems-and-solutions

More Related Content

Similar to American University What Areas Are Concerning when Securing a Network.pdf

Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1brockdebroah
 
Hello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers iHello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers iSusanaFurman449
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Processphanleson
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxjeanettehully
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 
Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008John Gilligan
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxmarilucorr
 
Running Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxRunning Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxcowinhelen
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxsimba35
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 

Similar to American University What Areas Are Concerning when Securing a Network.pdf (20)

Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1
 
Hello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers iHello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers i
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
 
Running Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxRunning Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docx
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 

More from bkbk37

Range of.docx
Range of.docxRange of.docx
Range of.docxbkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docxbkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxbkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxbkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxbkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docxbkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docxbkbk37
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docxbkbk37
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docxbkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxbkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docxbkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docxbkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxbkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxbkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxbkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxbkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxbkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxbkbk37
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxbkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docxbkbk37
 

More from bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Recently uploaded (20)

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

American University What Areas Are Concerning when Securing a Network.pdf

  • 1. American University What Areas Are Concerning when Securing a Network HW Question DescriptionRefer to scenario for additional information.In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following: What challenges will need to be addressed with the U.S. Navy project described in your scenario?What types of vulnerabilities need to be addressed in the design?Where might there be points of failure in the design?What areas concern you about securing the network?What steps would you recommend to overcome those concerns?Also respond to the two discussion below.A few challenges that need to be addressed with the U.S. Navy is how quickly they want this initial design to be completed. Remember we do not have our security clearance just yet and that might hold us back in being able to handle certain equipment and have access to certain types of data. Another issue would be how I would I create a network design that would conform to the Navy’s Standards. And finally another issues to be taken up is why in the first place internal network and external Department of Defense suppliers are not “considered” secured.Vulnerabilities that should be looked at in the design are Hardware and Software Failures and Errors, with over 260 hosts with additional hardware of printers and base design plotters we could run into equipment that has flaws already in them (Whittman, Mattford). These flaws could result in downtime of equipment and failure to protect network traffic (Whittman,Mattford). Another vulnerability to look at is the location of where this network design will implemented, will this location be where lightning and flooding frequently take place? A concern that I had for this project, is that I seem to be the only person with this security design, how many other people would I would be able to speak with about this plan and are available to assist me. Would I be able to consult with a DOD or Navy approved consultants. A suggestion I would think to have is a security team would be a useful tool to have on standby. Another concern that I had was what other assets I had to work with, per Eric Dosal to remedy this concern is to conduct a review of all the assets you have “and identify all the various platforms they run on” (Dosal).A point of failure that I worry about is the security policy with the US Navy, depending on policy my initial design might fail altogether if that it does not comply with DOD or Navy policies.Whitman,Mattford (2018) Principles of Information Security, Sixth Edition. Retrieved from https://ebooksbvd.my-education- connection.com/read/9781337470407/copyright_xhtml The most important challenge that
  • 2. needs to be addressed with the U.S. Navy project is the level of security for all the different hosts that will be accessing the databases. Giving each particular department the correct clearance level, one would need to utilize the Least Privilege Principle by beginning here with the security this sets up the system to where the clearance needs to be at (American InterContinental University [AIU], n.d.). The other challenge will be making sure that the people logging into the secure top-secret areas know the procedures to logging on and off before going to the nonsecure areas of the system. Setting up the VPN so that the captain in charge and his staff with the project have a way to securely connect from remote places that way they are able to tunnel their activity in a more secure manner (IVPN, n.d.). The vulnerabilities that the design will encounter would be setting the acquisition department and the personal department up so they can access to the secure internal network and external Department of Defense suppliers and not have access to the top-secret areas of the system but allowing the other departments access to those areas. To negate the vulnerabilities that will be encountered are thorough investigations into the staff that will have access to the systems, checkpoint security stations to the work areas, and thorough research into the system to better know what setup is already and what it is lacking. The points of failure will more than anything else be attributed to staff error, outsiders trying to make access to the system, and lapses of judgment by everyone involved. There need to be ongoing training and refresher courses on security measures to keep security at the forefront of everyone’s minds. All the areas concern me because they are all important to the security of the facility, hopefully, I will have the know-how to combat the obstacles that arise in the project. To overcome these concerns, I plan on doing thorough research into all the areas and try and patch the holes in the system before someone else finds them and trouble arises.ReferenceAmerican InterContinental University. (n.d.). Security Trends and Concepts: Security Trends and Concepts [Multimedia presentation]. Retrieved from American InterContinental University Virtual Campus, ITCO361-1905A-01: https://mycampus.aiu-online.comIVPN. (n.d.) What is a VPN tunnel?. Retrieved from https://www.ivpn.net/what-is-a-tunnelDosal, Eric (2018) 5 common Network Security Problems and Solutions . Retrieved from https://www.compuquip.com/blog/5-common- network-security-problems-and-solutions