SlideShare a Scribd company logo
ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!! Your CISO was
very happy with the
ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!!Your CISO was very happy with
the recommendations that you made in Week 3. They have accepted your recommendations
as valid, but have requested additional information on the firewall solution. The CISO is now
asking for:Firewall best practices that you will implement to ensure confidentiality,
integrity, and availability (CIA, page 6, first mention in textbook).The best firewall to
support his requirement for detailed logging.The firewall type.Your plan for managing
it.RESPOND TO ANDREWWell no firewall is going to be able to ensure that confidentiality,
integrity, and availability (CIA) will be protected on its own. The firewall is just part of the
holistic security architecture. Confidentiality has to do with data privacy, the benefit a
firewall has on this aspect is the ability to stop network traffic from untrusted sources into
the network, fighting off things like phishing attacks. Conversely it can also be a screen to
the internal network by not allowing certain information leave a local area network (LAN).
Firewalls that are acting in other capacities such as a gateway also ensure that information
is not accessible between two separate networks in a LAN. In terms of integrity I honestly
don’t see firewalls as being able to provide much. Data encryption, hashing, checksums,
digital signatures all ensure data integrity. A firewall, as far as I’m aware, has no method of
data integrity verification. The best I can offer is from the reading where a firewall can be
configured as a fail-safe so if there is a breach it stops allowing traffic to traverse. Please let
me know if I am mistaken. Looking at availability, this is a firewalls bread and butter, acting
on a deny by default allow by exception method. Firewalls monitor traffic between LANs
and WANs based off of the configuration.Looking at best practice for firewalls keeping the
CIA triad in mind we need to first assess the network and determine firewall placement.
Typically one is going to go at the gateway to the internet and act as our first defense. The
bastion host idea is something I would implement to thwart all well-known malicious
signatures, stop sketchy requests and connections. I would also configure a demilitarized
zone for all public facing servers to protect internal LANs. Finally, within the LAN I would
set up firewalls as necessary between departments where simple access control may not be
effective. I would focus on the outbound connections and ensure that rules are configured to
stop traffic leaving the network that may be dangerous in an external agencies hands.The
best type of firewall for defense of the internal network is the next generation firewall
(NGFW). Typically these come with numerous other functions that affirm the defense in
depth concept and provide a one size fits most. NGFW provide packet filtering, built in
intrusion prevention systems (IPS), built in sandboxing, and large malicious traffic
signature libraries. They allow for administrators to have visibility over users, hosts,
networks, and devices; they can pinpoint where breaches occurred and they will work on
applications and web traffic alike (Cisco, 2022). NGFWs also come with the ability to learn
and establish baselines for normal network traffic to identify anomalies and provide
warnings. They can analyze patterns to identify issues or at least notify the administrators
of what’s going on. Third party services will offer cloud space for monitoring and push
updates to clients when libraries are updated with new attack signatures automatically.I
would recommend any Cisco commercial product, as they have a simple and effective
method for all aforementioned characteristics of firewalls to include logging.In managing
the firewall I would start with policy, a subsection in the overall security policy.
Configuration rules and set up instructions with all of the pertinent information to include
OS type and year and service pack information. It will address the log monitoring and
review procedures with the responsible parties indicated. A clear logical diagram of where
hardware and software firewalls reside. I would also ensure that risk decisions are
annotated, for example the security team suggested a newer bastion host and management
declined, I want all of that documented. The last piece from a management perspective is all
transactional data for who did what on the software or hardware, periodic logging of the
audits, and any recommended changes.RESPOND TO CHRISTOPHERThe principal of
information security is to protect the confidentiality, integrity, and availability of
information from harm. Confidentiality is assurance of data privacy. Integrity is assurance
of data non-alteration. Availability is assurance in the timely and reliable access to data
services for authorized users. It ensures that information or resources are available when
required.Addressing the CISO concern policy there would need to be a firewall policy in
place. Establishing this policy is primordial in the success of a system because it establishes
tangible goals. Employees need to read and understand the policy so it should be relatively
easy to understand.I would implement firewall rules that are relevant to the organization; a
security stance that would benefit the security of the organization without affecting
functionality. Because with too many rules this can easily happen. The rules and protocols
should include communication between internal systems as well as communication with
external systems to determine, chokepoints or weakest points that would need a hardware
firewall in combination with an installed software firewall.The policy also will include a
disaster or compromise procedures to allow for immediate action when or if an intrusion is
detected. Patching and installing latest updates to antivirus, antispyware and other security
tools on all workstations needs to be done consistently. Remote access to the network
should be limited. A good defense-in-depth concept should be applied where use of ISD, IPS,
auditing, NAT, multifactor authentication and secure VPN reimplementation addition, any
unused ports should be disabled. “The ideal firewall solutions for small business integrate a
hardware firewall with software controls into a comprehensive security solution that
includes virtual private network (VPN) support, antivirus, anti-spam, anti-spyware, and
content filtering capabilities” (Cisco). I would recommend using a Cisco firewall as they
have a trusted history and are an industry standard. Support for Cisco products is also
readily available. Most firewalls will have some sort of detailed logging capability already
incorporated with the firewall and would use the logging capability that comes with the
Cisco firewall. I would suggest setting up to automatically or manually moving log files from
the firewall to a secure storage location. Vigilant monitoring needs to be performed by the
network administrators to keep the network secure. Using a tool like NMAP would be a
good choice to monitor network traffic. “Nmap is commonly used for security audits, many
systems and network administrators find it useful for routine tasks such as network
inventory, managing service upgrade schedules, and monitoring host or service uptime.”
(NMAP).

More Related Content

Similar to ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx

TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentSaikat Chaudhuri
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in networksheikhparvez4
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxAneenaBinoy2
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSMuhammad FAHAD
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securityCTi Controltech
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attackAnalynk Wireless, LLC
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsMiller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackCTi Controltech
 

Similar to ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx (20)

Network security
Network securityNetwork security
Network security
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Firewall
FirewallFirewall
Firewall
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 

More from write31

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxwrite31
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxwrite31
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docxwrite31
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxwrite31
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxwrite31
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docxwrite31
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwrite31
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxwrite31
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxwrite31
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwrite31
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxwrite31
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxwrite31
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxwrite31
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxwrite31
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxwrite31
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxwrite31
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxwrite31
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxwrite31
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxwrite31
 

More from write31 (20)

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docx
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docx
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docx
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docx
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docx
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docx
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docx
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docx
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docx
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docx
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docx
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docx
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docx
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docx
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docx
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docx
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docx
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docx
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docx
 

Recently uploaded

Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 

Recently uploaded (20)

Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 

ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx

  • 1. ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!! Your CISO was very happy with the ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!!Your CISO was very happy with the recommendations that you made in Week 3. They have accepted your recommendations as valid, but have requested additional information on the firewall solution. The CISO is now asking for:Firewall best practices that you will implement to ensure confidentiality, integrity, and availability (CIA, page 6, first mention in textbook).The best firewall to support his requirement for detailed logging.The firewall type.Your plan for managing it.RESPOND TO ANDREWWell no firewall is going to be able to ensure that confidentiality, integrity, and availability (CIA) will be protected on its own. The firewall is just part of the holistic security architecture. Confidentiality has to do with data privacy, the benefit a firewall has on this aspect is the ability to stop network traffic from untrusted sources into the network, fighting off things like phishing attacks. Conversely it can also be a screen to the internal network by not allowing certain information leave a local area network (LAN). Firewalls that are acting in other capacities such as a gateway also ensure that information is not accessible between two separate networks in a LAN. In terms of integrity I honestly don’t see firewalls as being able to provide much. Data encryption, hashing, checksums, digital signatures all ensure data integrity. A firewall, as far as I’m aware, has no method of data integrity verification. The best I can offer is from the reading where a firewall can be configured as a fail-safe so if there is a breach it stops allowing traffic to traverse. Please let me know if I am mistaken. Looking at availability, this is a firewalls bread and butter, acting on a deny by default allow by exception method. Firewalls monitor traffic between LANs and WANs based off of the configuration.Looking at best practice for firewalls keeping the CIA triad in mind we need to first assess the network and determine firewall placement. Typically one is going to go at the gateway to the internet and act as our first defense. The bastion host idea is something I would implement to thwart all well-known malicious signatures, stop sketchy requests and connections. I would also configure a demilitarized zone for all public facing servers to protect internal LANs. Finally, within the LAN I would set up firewalls as necessary between departments where simple access control may not be effective. I would focus on the outbound connections and ensure that rules are configured to stop traffic leaving the network that may be dangerous in an external agencies hands.The best type of firewall for defense of the internal network is the next generation firewall (NGFW). Typically these come with numerous other functions that affirm the defense in
  • 2. depth concept and provide a one size fits most. NGFW provide packet filtering, built in intrusion prevention systems (IPS), built in sandboxing, and large malicious traffic signature libraries. They allow for administrators to have visibility over users, hosts, networks, and devices; they can pinpoint where breaches occurred and they will work on applications and web traffic alike (Cisco, 2022). NGFWs also come with the ability to learn and establish baselines for normal network traffic to identify anomalies and provide warnings. They can analyze patterns to identify issues or at least notify the administrators of what’s going on. Third party services will offer cloud space for monitoring and push updates to clients when libraries are updated with new attack signatures automatically.I would recommend any Cisco commercial product, as they have a simple and effective method for all aforementioned characteristics of firewalls to include logging.In managing the firewall I would start with policy, a subsection in the overall security policy. Configuration rules and set up instructions with all of the pertinent information to include OS type and year and service pack information. It will address the log monitoring and review procedures with the responsible parties indicated. A clear logical diagram of where hardware and software firewalls reside. I would also ensure that risk decisions are annotated, for example the security team suggested a newer bastion host and management declined, I want all of that documented. The last piece from a management perspective is all transactional data for who did what on the software or hardware, periodic logging of the audits, and any recommended changes.RESPOND TO CHRISTOPHERThe principal of information security is to protect the confidentiality, integrity, and availability of information from harm. Confidentiality is assurance of data privacy. Integrity is assurance of data non-alteration. Availability is assurance in the timely and reliable access to data services for authorized users. It ensures that information or resources are available when required.Addressing the CISO concern policy there would need to be a firewall policy in place. Establishing this policy is primordial in the success of a system because it establishes tangible goals. Employees need to read and understand the policy so it should be relatively easy to understand.I would implement firewall rules that are relevant to the organization; a security stance that would benefit the security of the organization without affecting functionality. Because with too many rules this can easily happen. The rules and protocols should include communication between internal systems as well as communication with external systems to determine, chokepoints or weakest points that would need a hardware firewall in combination with an installed software firewall.The policy also will include a disaster or compromise procedures to allow for immediate action when or if an intrusion is detected. Patching and installing latest updates to antivirus, antispyware and other security tools on all workstations needs to be done consistently. Remote access to the network should be limited. A good defense-in-depth concept should be applied where use of ISD, IPS, auditing, NAT, multifactor authentication and secure VPN reimplementation addition, any unused ports should be disabled. “The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, anti-spam, anti-spyware, and content filtering capabilities” (Cisco). I would recommend using a Cisco firewall as they have a trusted history and are an industry standard. Support for Cisco products is also
  • 3. readily available. Most firewalls will have some sort of detailed logging capability already incorporated with the firewall and would use the logging capability that comes with the Cisco firewall. I would suggest setting up to automatically or manually moving log files from the firewall to a secure storage location. Vigilant monitoring needs to be performed by the network administrators to keep the network secure. Using a tool like NMAP would be a good choice to monitor network traffic. “Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.” (NMAP).