SlideShare a Scribd company logo
ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!! Your CISO was
very happy with the
ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!!Your CISO was very happy with
the recommendations that you made in Week 3. They have accepted your recommendations
as valid, but have requested additional information on the firewall solution. The CISO is now
asking for:Firewall best practices that you will implement to ensure confidentiality,
integrity, and availability (CIA, page 6, first mention in textbook).The best firewall to
support his requirement for detailed logging.The firewall type.Your plan for managing
it.RESPOND TO ANDREWWell no firewall is going to be able to ensure that confidentiality,
integrity, and availability (CIA) will be protected on its own. The firewall is just part of the
holistic security architecture. Confidentiality has to do with data privacy, the benefit a
firewall has on this aspect is the ability to stop network traffic from untrusted sources into
the network, fighting off things like phishing attacks. Conversely it can also be a screen to
the internal network by not allowing certain information leave a local area network (LAN).
Firewalls that are acting in other capacities such as a gateway also ensure that information
is not accessible between two separate networks in a LAN. In terms of integrity I honestly
don’t see firewalls as being able to provide much. Data encryption, hashing, checksums,
digital signatures all ensure data integrity. A firewall, as far as I’m aware, has no method of
data integrity verification. The best I can offer is from the reading where a firewall can be
configured as a fail-safe so if there is a breach it stops allowing traffic to traverse. Please let
me know if I am mistaken. Looking at availability, this is a firewalls bread and butter, acting
on a deny by default allow by exception method. Firewalls monitor traffic between LANs
and WANs based off of the configuration.Looking at best practice for firewalls keeping the
CIA triad in mind we need to first assess the network and determine firewall placement.
Typically one is going to go at the gateway to the internet and act as our first defense. The
bastion host idea is something I would implement to thwart all well-known malicious
signatures, stop sketchy requests and connections. I would also configure a demilitarized
zone for all public facing servers to protect internal LANs. Finally, within the LAN I would
set up firewalls as necessary between departments where simple access control may not be
effective. I would focus on the outbound connections and ensure that rules are configured to
stop traffic leaving the network that may be dangerous in an external agencies hands.The
best type of firewall for defense of the internal network is the next generation firewall
(NGFW). Typically these come with numerous other functions that affirm the defense in
depth concept and provide a one size fits most. NGFW provide packet filtering, built in
intrusion prevention systems (IPS), built in sandboxing, and large malicious traffic
signature libraries. They allow for administrators to have visibility over users, hosts,
networks, and devices; they can pinpoint where breaches occurred and they will work on
applications and web traffic alike (Cisco, 2022). NGFWs also come with the ability to learn
and establish baselines for normal network traffic to identify anomalies and provide
warnings. They can analyze patterns to identify issues or at least notify the administrators
of what’s going on. Third party services will offer cloud space for monitoring and push
updates to clients when libraries are updated with new attack signatures automatically.I
would recommend any Cisco commercial product, as they have a simple and effective
method for all aforementioned characteristics of firewalls to include logging.In managing
the firewall I would start with policy, a subsection in the overall security policy.
Configuration rules and set up instructions with all of the pertinent information to include
OS type and year and service pack information. It will address the log monitoring and
review procedures with the responsible parties indicated. A clear logical diagram of where
hardware and software firewalls reside. I would also ensure that risk decisions are
annotated, for example the security team suggested a newer bastion host and management
declined, I want all of that documented. The last piece from a management perspective is all
transactional data for who did what on the software or hardware, periodic logging of the
audits, and any recommended changes.RESPOND TO CHRISTOPHERThe principal of
information security is to protect the confidentiality, integrity, and availability of
information from harm. Confidentiality is assurance of data privacy. Integrity is assurance
of data non-alteration. Availability is assurance in the timely and reliable access to data
services for authorized users. It ensures that information or resources are available when
required.Addressing the CISO concern policy there would need to be a firewall policy in
place. Establishing this policy is primordial in the success of a system because it establishes
tangible goals. Employees need to read and understand the policy so it should be relatively
easy to understand.I would implement firewall rules that are relevant to the organization; a
security stance that would benefit the security of the organization without affecting
functionality. Because with too many rules this can easily happen. The rules and protocols
should include communication between internal systems as well as communication with
external systems to determine, chokepoints or weakest points that would need a hardware
firewall in combination with an installed software firewall.The policy also will include a
disaster or compromise procedures to allow for immediate action when or if an intrusion is
detected. Patching and installing latest updates to antivirus, antispyware and other security
tools on all workstations needs to be done consistently. Remote access to the network
should be limited. A good defense-in-depth concept should be applied where use of ISD, IPS,
auditing, NAT, multifactor authentication and secure VPN reimplementation addition, any
unused ports should be disabled. “The ideal firewall solutions for small business integrate a
hardware firewall with software controls into a comprehensive security solution that
includes virtual private network (VPN) support, antivirus, anti-spam, anti-spyware, and
content filtering capabilities” (Cisco). I would recommend using a Cisco firewall as they
have a trusted history and are an industry standard. Support for Cisco products is also
readily available. Most firewalls will have some sort of detailed logging capability already
incorporated with the firewall and would use the logging capability that comes with the
Cisco firewall. I would suggest setting up to automatically or manually moving log files from
the firewall to a secure storage location. Vigilant monitoring needs to be performed by the
network administrators to keep the network secure. Using a tool like NMAP would be a
good choice to monitor network traffic. “Nmap is commonly used for security audits, many
systems and network administrators find it useful for routine tasks such as network
inventory, managing service upgrade schedules, and monitoring host or service uptime.”
(NMAP).

More Related Content

Similar to ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx

Network security
Network securityNetwork security
Network security
Shyam Kumar Singh
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentSaikat Chaudhuri
 
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
Cryptzone
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
AlexisHarvey8
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
sheikhparvez4
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
AneenaBinoy2
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
Ben Rothke
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
Raj Sarode
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
IT AMC Support Dubai - Techno Edge Systems LLC
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
Muhammad FAHAD
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
CTi Controltech
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
Mountain States Engineering and Controls
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
Analynk Wireless, LLC
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Miller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
CTi Controltech
 

Similar to ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx (20)

Network security
Network securityNetwork security
Network security
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Firewall
FirewallFirewall
Firewall
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 

More from write4

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
write4
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
write4
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
write4
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docx
write4
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docx
write4
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
write4
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docx
write4
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docx
write4
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docx
write4
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
write4
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
write4
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
write4
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
write4
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
write4
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
write4
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
write4
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
write4
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docx
write4
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docx
write4
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
write4
 

More from write4 (20)

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docx
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docx
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docx
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docx
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docx
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docx
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docx
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
 

Recently uploaded

一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
zaquoa
 
Roti Bank Hyderabad: A Beacon of Hope and Nourishment
Roti Bank Hyderabad: A Beacon of Hope and NourishmentRoti Bank Hyderabad: A Beacon of Hope and Nourishment
Roti Bank Hyderabad: A Beacon of Hope and Nourishment
Roti Bank
 
Kitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI actKitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI act
MuthuMK13
 
一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理
一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理
一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理
zaquoa
 
Food and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptxFood and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptx
mangenatendaishe
 
一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理
一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理
一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理
saseh1
 
Roti Bank Delhi: Nourishing Lives, One Meal at a Time
Roti Bank Delhi: Nourishing Lives, One Meal at a TimeRoti Bank Delhi: Nourishing Lives, One Meal at a Time
Roti Bank Delhi: Nourishing Lives, One Meal at a Time
Roti Bank
 
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...
Ang Chong Yi
 
Best Chicken Mandi in Ghaziabad near me.
Best Chicken Mandi in Ghaziabad near me.Best Chicken Mandi in Ghaziabad near me.
Best Chicken Mandi in Ghaziabad near me.
tasteofmiddleeast07
 
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics ResearchMS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
Panagiotis Arapitsas
 

Recently uploaded (10)

一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
Roti Bank Hyderabad: A Beacon of Hope and Nourishment
Roti Bank Hyderabad: A Beacon of Hope and NourishmentRoti Bank Hyderabad: A Beacon of Hope and Nourishment
Roti Bank Hyderabad: A Beacon of Hope and Nourishment
 
Kitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI actKitchen Audit at restaurant as per FSSAI act
Kitchen Audit at restaurant as per FSSAI act
 
一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理
一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理
一比一原版UMN毕业证明尼苏达大学毕业证成绩单如何办理
 
Food and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptxFood and beverage service Restaurant Services notes V1.pptx
Food and beverage service Restaurant Services notes V1.pptx
 
一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理
一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理
一比一原版IC毕业证帝国理工大学毕业证成绩单如何办理
 
Roti Bank Delhi: Nourishing Lives, One Meal at a Time
Roti Bank Delhi: Nourishing Lives, One Meal at a TimeRoti Bank Delhi: Nourishing Lives, One Meal at a Time
Roti Bank Delhi: Nourishing Lives, One Meal at a Time
 
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...
 
Best Chicken Mandi in Ghaziabad near me.
Best Chicken Mandi in Ghaziabad near me.Best Chicken Mandi in Ghaziabad near me.
Best Chicken Mandi in Ghaziabad near me.
 
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics ResearchMS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
MS Wine Day 2024 Arapitsas Advancements in Wine Metabolomics Research
 

ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx

  • 1. ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!! Your CISO was very happy with the ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!!Your CISO was very happy with the recommendations that you made in Week 3. They have accepted your recommendations as valid, but have requested additional information on the firewall solution. The CISO is now asking for:Firewall best practices that you will implement to ensure confidentiality, integrity, and availability (CIA, page 6, first mention in textbook).The best firewall to support his requirement for detailed logging.The firewall type.Your plan for managing it.RESPOND TO ANDREWWell no firewall is going to be able to ensure that confidentiality, integrity, and availability (CIA) will be protected on its own. The firewall is just part of the holistic security architecture. Confidentiality has to do with data privacy, the benefit a firewall has on this aspect is the ability to stop network traffic from untrusted sources into the network, fighting off things like phishing attacks. Conversely it can also be a screen to the internal network by not allowing certain information leave a local area network (LAN). Firewalls that are acting in other capacities such as a gateway also ensure that information is not accessible between two separate networks in a LAN. In terms of integrity I honestly don’t see firewalls as being able to provide much. Data encryption, hashing, checksums, digital signatures all ensure data integrity. A firewall, as far as I’m aware, has no method of data integrity verification. The best I can offer is from the reading where a firewall can be configured as a fail-safe so if there is a breach it stops allowing traffic to traverse. Please let me know if I am mistaken. Looking at availability, this is a firewalls bread and butter, acting on a deny by default allow by exception method. Firewalls monitor traffic between LANs and WANs based off of the configuration.Looking at best practice for firewalls keeping the CIA triad in mind we need to first assess the network and determine firewall placement. Typically one is going to go at the gateway to the internet and act as our first defense. The bastion host idea is something I would implement to thwart all well-known malicious signatures, stop sketchy requests and connections. I would also configure a demilitarized zone for all public facing servers to protect internal LANs. Finally, within the LAN I would set up firewalls as necessary between departments where simple access control may not be effective. I would focus on the outbound connections and ensure that rules are configured to stop traffic leaving the network that may be dangerous in an external agencies hands.The best type of firewall for defense of the internal network is the next generation firewall (NGFW). Typically these come with numerous other functions that affirm the defense in
  • 2. depth concept and provide a one size fits most. NGFW provide packet filtering, built in intrusion prevention systems (IPS), built in sandboxing, and large malicious traffic signature libraries. They allow for administrators to have visibility over users, hosts, networks, and devices; they can pinpoint where breaches occurred and they will work on applications and web traffic alike (Cisco, 2022). NGFWs also come with the ability to learn and establish baselines for normal network traffic to identify anomalies and provide warnings. They can analyze patterns to identify issues or at least notify the administrators of what’s going on. Third party services will offer cloud space for monitoring and push updates to clients when libraries are updated with new attack signatures automatically.I would recommend any Cisco commercial product, as they have a simple and effective method for all aforementioned characteristics of firewalls to include logging.In managing the firewall I would start with policy, a subsection in the overall security policy. Configuration rules and set up instructions with all of the pertinent information to include OS type and year and service pack information. It will address the log monitoring and review procedures with the responsible parties indicated. A clear logical diagram of where hardware and software firewalls reside. I would also ensure that risk decisions are annotated, for example the security team suggested a newer bastion host and management declined, I want all of that documented. The last piece from a management perspective is all transactional data for who did what on the software or hardware, periodic logging of the audits, and any recommended changes.RESPOND TO CHRISTOPHERThe principal of information security is to protect the confidentiality, integrity, and availability of information from harm. Confidentiality is assurance of data privacy. Integrity is assurance of data non-alteration. Availability is assurance in the timely and reliable access to data services for authorized users. It ensures that information or resources are available when required.Addressing the CISO concern policy there would need to be a firewall policy in place. Establishing this policy is primordial in the success of a system because it establishes tangible goals. Employees need to read and understand the policy so it should be relatively easy to understand.I would implement firewall rules that are relevant to the organization; a security stance that would benefit the security of the organization without affecting functionality. Because with too many rules this can easily happen. The rules and protocols should include communication between internal systems as well as communication with external systems to determine, chokepoints or weakest points that would need a hardware firewall in combination with an installed software firewall.The policy also will include a disaster or compromise procedures to allow for immediate action when or if an intrusion is detected. Patching and installing latest updates to antivirus, antispyware and other security tools on all workstations needs to be done consistently. Remote access to the network should be limited. A good defense-in-depth concept should be applied where use of ISD, IPS, auditing, NAT, multifactor authentication and secure VPN reimplementation addition, any unused ports should be disabled. “The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, anti-spam, anti-spyware, and content filtering capabilities” (Cisco). I would recommend using a Cisco firewall as they have a trusted history and are an industry standard. Support for Cisco products is also
  • 3. readily available. Most firewalls will have some sort of detailed logging capability already incorporated with the firewall and would use the logging capability that comes with the Cisco firewall. I would suggest setting up to automatically or manually moving log files from the firewall to a secure storage location. Vigilant monitoring needs to be performed by the network administrators to keep the network secure. Using a tool like NMAP would be a good choice to monitor network traffic. “Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.” (NMAP).