SlideShare a Scribd company logo
1 of 3
ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!! Your CISO was
very happy with the
ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!!Your CISO was very happy with
the recommendations that you made in Week 3. They have accepted your recommendations
as valid, but have requested additional information on the firewall solution. The CISO is now
asking for:Firewall best practices that you will implement to ensure confidentiality,
integrity, and availability (CIA, page 6, first mention in textbook).The best firewall to
support his requirement for detailed logging.The firewall type.Your plan for managing
it.RESPOND TO ANDREWWell no firewall is going to be able to ensure that confidentiality,
integrity, and availability (CIA) will be protected on its own. The firewall is just part of the
holistic security architecture. Confidentiality has to do with data privacy, the benefit a
firewall has on this aspect is the ability to stop network traffic from untrusted sources into
the network, fighting off things like phishing attacks. Conversely it can also be a screen to
the internal network by not allowing certain information leave a local area network (LAN).
Firewalls that are acting in other capacities such as a gateway also ensure that information
is not accessible between two separate networks in a LAN. In terms of integrity I honestly
don’t see firewalls as being able to provide much. Data encryption, hashing, checksums,
digital signatures all ensure data integrity. A firewall, as far as I’m aware, has no method of
data integrity verification. The best I can offer is from the reading where a firewall can be
configured as a fail-safe so if there is a breach it stops allowing traffic to traverse. Please let
me know if I am mistaken. Looking at availability, this is a firewalls bread and butter, acting
on a deny by default allow by exception method. Firewalls monitor traffic between LANs
and WANs based off of the configuration.Looking at best practice for firewalls keeping the
CIA triad in mind we need to first assess the network and determine firewall placement.
Typically one is going to go at the gateway to the internet and act as our first defense. The
bastion host idea is something I would implement to thwart all well-known malicious
signatures, stop sketchy requests and connections. I would also configure a demilitarized
zone for all public facing servers to protect internal LANs. Finally, within the LAN I would
set up firewalls as necessary between departments where simple access control may not be
effective. I would focus on the outbound connections and ensure that rules are configured to
stop traffic leaving the network that may be dangerous in an external agencies hands.The
best type of firewall for defense of the internal network is the next generation firewall
(NGFW). Typically these come with numerous other functions that affirm the defense in
depth concept and provide a one size fits most. NGFW provide packet filtering, built in
intrusion prevention systems (IPS), built in sandboxing, and large malicious traffic
signature libraries. They allow for administrators to have visibility over users, hosts,
networks, and devices; they can pinpoint where breaches occurred and they will work on
applications and web traffic alike (Cisco, 2022). NGFWs also come with the ability to learn
and establish baselines for normal network traffic to identify anomalies and provide
warnings. They can analyze patterns to identify issues or at least notify the administrators
of what’s going on. Third party services will offer cloud space for monitoring and push
updates to clients when libraries are updated with new attack signatures automatically.I
would recommend any Cisco commercial product, as they have a simple and effective
method for all aforementioned characteristics of firewalls to include logging.In managing
the firewall I would start with policy, a subsection in the overall security policy.
Configuration rules and set up instructions with all of the pertinent information to include
OS type and year and service pack information. It will address the log monitoring and
review procedures with the responsible parties indicated. A clear logical diagram of where
hardware and software firewalls reside. I would also ensure that risk decisions are
annotated, for example the security team suggested a newer bastion host and management
declined, I want all of that documented. The last piece from a management perspective is all
transactional data for who did what on the software or hardware, periodic logging of the
audits, and any recommended changes.RESPOND TO CHRISTOPHERThe principal of
information security is to protect the confidentiality, integrity, and availability of
information from harm. Confidentiality is assurance of data privacy. Integrity is assurance
of data non-alteration. Availability is assurance in the timely and reliable access to data
services for authorized users. It ensures that information or resources are available when
required.Addressing the CISO concern policy there would need to be a firewall policy in
place. Establishing this policy is primordial in the success of a system because it establishes
tangible goals. Employees need to read and understand the policy so it should be relatively
easy to understand.I would implement firewall rules that are relevant to the organization; a
security stance that would benefit the security of the organization without affecting
functionality. Because with too many rules this can easily happen. The rules and protocols
should include communication between internal systems as well as communication with
external systems to determine, chokepoints or weakest points that would need a hardware
firewall in combination with an installed software firewall.The policy also will include a
disaster or compromise procedures to allow for immediate action when or if an intrusion is
detected. Patching and installing latest updates to antivirus, antispyware and other security
tools on all workstations needs to be done consistently. Remote access to the network
should be limited. A good defense-in-depth concept should be applied where use of ISD, IPS,
auditing, NAT, multifactor authentication and secure VPN reimplementation addition, any
unused ports should be disabled. “The ideal firewall solutions for small business integrate a
hardware firewall with software controls into a comprehensive security solution that
includes virtual private network (VPN) support, antivirus, anti-spam, anti-spyware, and
content filtering capabilities” (Cisco). I would recommend using a Cisco firewall as they
have a trusted history and are an industry standard. Support for Cisco products is also
readily available. Most firewalls will have some sort of detailed logging capability already
incorporated with the firewall and would use the logging capability that comes with the
Cisco firewall. I would suggest setting up to automatically or manually moving log files from
the firewall to a secure storage location. Vigilant monitoring needs to be performed by the
network administrators to keep the network secure. Using a tool like NMAP would be a
good choice to monitor network traffic. “Nmap is commonly used for security audits, many
systems and network administrators find it useful for routine tasks such as network
inventory, managing service upgrade schedules, and monitoring host or service uptime.”
(NMAP).

More Related Content

Similar to ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx

TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentSaikat Chaudhuri
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in networksheikhparvez4
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxAneenaBinoy2
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSMuhammad FAHAD
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attackAnalynk Wireless, LLC
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsMiller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackCTi Controltech
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securityCTi Controltech
 

Similar to ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx (20)

Network security
Network securityNetwork security
Network security
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Firewall
FirewallFirewall
Firewall
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 

More from write31

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxwrite31
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxwrite31
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docxwrite31
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxwrite31
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxwrite31
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docxwrite31
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwrite31
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxwrite31
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxwrite31
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwrite31
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxwrite31
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxwrite31
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxwrite31
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxwrite31
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxwrite31
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxwrite31
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxwrite31
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxwrite31
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxwrite31
 

More from write31 (20)

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docx
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docx
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docx
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docx
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docx
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docx
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docx
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docx
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docx
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docx
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docx
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docx
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docx
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docx
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docx
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docx
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docx
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docx
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docx
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx

  • 1. ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!! Your CISO was very happy with the ANSWER QUESTIONS AND RESPOND TO BOTH PEERS!!!!Your CISO was very happy with the recommendations that you made in Week 3. They have accepted your recommendations as valid, but have requested additional information on the firewall solution. The CISO is now asking for:Firewall best practices that you will implement to ensure confidentiality, integrity, and availability (CIA, page 6, first mention in textbook).The best firewall to support his requirement for detailed logging.The firewall type.Your plan for managing it.RESPOND TO ANDREWWell no firewall is going to be able to ensure that confidentiality, integrity, and availability (CIA) will be protected on its own. The firewall is just part of the holistic security architecture. Confidentiality has to do with data privacy, the benefit a firewall has on this aspect is the ability to stop network traffic from untrusted sources into the network, fighting off things like phishing attacks. Conversely it can also be a screen to the internal network by not allowing certain information leave a local area network (LAN). Firewalls that are acting in other capacities such as a gateway also ensure that information is not accessible between two separate networks in a LAN. In terms of integrity I honestly don’t see firewalls as being able to provide much. Data encryption, hashing, checksums, digital signatures all ensure data integrity. A firewall, as far as I’m aware, has no method of data integrity verification. The best I can offer is from the reading where a firewall can be configured as a fail-safe so if there is a breach it stops allowing traffic to traverse. Please let me know if I am mistaken. Looking at availability, this is a firewalls bread and butter, acting on a deny by default allow by exception method. Firewalls monitor traffic between LANs and WANs based off of the configuration.Looking at best practice for firewalls keeping the CIA triad in mind we need to first assess the network and determine firewall placement. Typically one is going to go at the gateway to the internet and act as our first defense. The bastion host idea is something I would implement to thwart all well-known malicious signatures, stop sketchy requests and connections. I would also configure a demilitarized zone for all public facing servers to protect internal LANs. Finally, within the LAN I would set up firewalls as necessary between departments where simple access control may not be effective. I would focus on the outbound connections and ensure that rules are configured to stop traffic leaving the network that may be dangerous in an external agencies hands.The best type of firewall for defense of the internal network is the next generation firewall (NGFW). Typically these come with numerous other functions that affirm the defense in
  • 2. depth concept and provide a one size fits most. NGFW provide packet filtering, built in intrusion prevention systems (IPS), built in sandboxing, and large malicious traffic signature libraries. They allow for administrators to have visibility over users, hosts, networks, and devices; they can pinpoint where breaches occurred and they will work on applications and web traffic alike (Cisco, 2022). NGFWs also come with the ability to learn and establish baselines for normal network traffic to identify anomalies and provide warnings. They can analyze patterns to identify issues or at least notify the administrators of what’s going on. Third party services will offer cloud space for monitoring and push updates to clients when libraries are updated with new attack signatures automatically.I would recommend any Cisco commercial product, as they have a simple and effective method for all aforementioned characteristics of firewalls to include logging.In managing the firewall I would start with policy, a subsection in the overall security policy. Configuration rules and set up instructions with all of the pertinent information to include OS type and year and service pack information. It will address the log monitoring and review procedures with the responsible parties indicated. A clear logical diagram of where hardware and software firewalls reside. I would also ensure that risk decisions are annotated, for example the security team suggested a newer bastion host and management declined, I want all of that documented. The last piece from a management perspective is all transactional data for who did what on the software or hardware, periodic logging of the audits, and any recommended changes.RESPOND TO CHRISTOPHERThe principal of information security is to protect the confidentiality, integrity, and availability of information from harm. Confidentiality is assurance of data privacy. Integrity is assurance of data non-alteration. Availability is assurance in the timely and reliable access to data services for authorized users. It ensures that information or resources are available when required.Addressing the CISO concern policy there would need to be a firewall policy in place. Establishing this policy is primordial in the success of a system because it establishes tangible goals. Employees need to read and understand the policy so it should be relatively easy to understand.I would implement firewall rules that are relevant to the organization; a security stance that would benefit the security of the organization without affecting functionality. Because with too many rules this can easily happen. The rules and protocols should include communication between internal systems as well as communication with external systems to determine, chokepoints or weakest points that would need a hardware firewall in combination with an installed software firewall.The policy also will include a disaster or compromise procedures to allow for immediate action when or if an intrusion is detected. Patching and installing latest updates to antivirus, antispyware and other security tools on all workstations needs to be done consistently. Remote access to the network should be limited. A good defense-in-depth concept should be applied where use of ISD, IPS, auditing, NAT, multifactor authentication and secure VPN reimplementation addition, any unused ports should be disabled. “The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, anti-spam, anti-spyware, and content filtering capabilities” (Cisco). I would recommend using a Cisco firewall as they have a trusted history and are an industry standard. Support for Cisco products is also
  • 3. readily available. Most firewalls will have some sort of detailed logging capability already incorporated with the firewall and would use the logging capability that comes with the Cisco firewall. I would suggest setting up to automatically or manually moving log files from the firewall to a secure storage location. Vigilant monitoring needs to be performed by the network administrators to keep the network secure. Using a tool like NMAP would be a good choice to monitor network traffic. “Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.” (NMAP).