Answered step by step
Verified Expert Solution
Question
1 Approved Answer
For this exercise, imagine that you have recently been hired as a security analyst at a small / mediumsized business ( SMB ) called the
For this exercise, imagine that you have recently been hired as a security analyst at a smallmediumsized business SMB called the Juice Shop. The Juice Shop runs a small office network for its employees and an offsite data center for its missioncritical applications. The Juice Shop already has several basic security controls in place, such as packet filtering firewalls and Active Directory Domain Services, but until recently, cybersecurity has not been a top priority for the company. That changed after an employee was tricked into sharing their credentials by a spear phishing campaign.
Your manager, the Director of IT has asked you to review the Juice Shop IT Infrastructure and recommend additional security controls that could be implemented in each of the technical domains of a typical IT infrastructure everything but the User Domain, for which you already have some recommendations in hand Using the Internet, conduct research on common security controls that could be implemented at the Juice Shop. While conducting your research, you should use your knowledge of each domain to search for security controls specific to the technologies within each domain, rather than the domain itself.
Based on your research, identify security controls that could be implemented in the Workstation, LAN, I ANtnWAN WAN Remnte Arress and SvstemAnnlicatinn nomains Rernmmend and exnlain nne
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started