Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

For this exercise, imagine that you have recently been hired as a security analyst at a small / mediumsized business ( SMB ) called the

For this exercise, imagine that you have recently been hired as a security analyst at a small/mediumsized business (SMB) called the Juice Shop. The Juice Shop runs a small office network for its employees and an off-site data center for its mission-critical applications. The Juice Shop already has several basic security controls in place, such as packet filtering firewalls and Active Directory Domain Services, but until recently, cybersecurity has not been a top priority for the company. That changed after an employee was tricked into sharing their credentials by a spear phishing campaign.
Your manager, the Director of IT, has asked you to review the Juice Shop IT Infrastructure and recommend additional security controls that could be implemented in each of the technical domains of a typical IT infrastructure (everything but the User Domain, for which you already have some recommendations in hand). Using the Internet, conduct research on common security controls that could be implemented at the Juice Shop. While conducting your research, you should use your knowledge of each domain to search for security controls specific to the technologies within each domain, rather than the domain itself.
Based on your research, identify security controls that could be implemented in the Workstation, LAN, I AN-tn-WAN WAN Remnte Arress and Svstem/Annlicatinn nomains Rernmmend and exnlain nne
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions