Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

According to Forcepoint Links to an external site., secure networks are a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility

According to Forcepoint Links to an external site., secure networks are a "set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies" (Forcepoint, n.d.).
Furthermore, as you have learned in this module, securing and continuously monitoring the network requires many different technologies. And while the exact implementation and configuration options vary among them, the core concept largely remains the same: review and modify the default configurations according to your specific environment, organizational policy, industry, and regulatory requirements.
For this assignment, you will take a deep dive into a powerful feature found in modern firewalls that is commonly implemented and closely monitored across organizations.
Content filtering is a method of defining, controlling, and monitoring what type of online content is acceptable to its employees and contractors while on the organization's network. For example, an organization seeking to reduce distractions at work or improve the internet bandwidth speed may block social media and video streaming websites. Another common reason why an organization may employ a content filtering system is to prevent malware infection (e.g., block websites hosting pirated software) or avoid liability issues (e.g., block websites hosting obscene content).
Additionally, one crucial element to consider before blocking any content category is to think about any adverse impact it may have to legitimate segments of the organization. For example, while you may have a general organizational policy to block the social media category, your marketing and recruitment division may need to access that category to perform their job functions.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Management Databases And Organizations

Authors: Watson Watson

5th Edition

0471715360, 978-0471715368

More Books

Students also viewed these Databases questions

Question

What do you mean by dual mode operation?

Answered: 1 week ago

Question

Explain the difference between `==` and `===` in JavaScript.

Answered: 1 week ago

Question

OUTCOME 1 Explain the reasons for equity-related legislation.

Answered: 1 week ago