Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this part, suppose that you are hired as a security consultant for a corporate ( XYZ.COM ). The Security Operations Center (SOC) belonging to

In this part, suppose that you are hired as a security consultant for a corporate (XYZ.COM). The Security Operations Center (SOC) belonging to the company is hosted on-premises and consists of the below existing elements:

  • SRV-1: SIEM Server
  • SRV-2: Vulnerability Assessment Server
  • FW-IPS1: Network Security devices
  • Anti-Virus Agents: Endpoint protection agents
  • SYSLOG Agents: Logging agents installed on Servers

As a security consultant, you should propose convenient configuration and SOC design. Answer the following:

  1. The server is still susceptible to many attacks. You need to adequately classify these attacks by filling the table in below: (6 marks)

Security Feature

Fill by

[1,2,3,4,5,6,7]

or write the corresponding OSI layer name

Use of SSL

Standard Access Control List on Cisco router

Extended Access Control List on Cisco router

ZPF firewall

Intrusion prevention system

Switch port security

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

2nd Edition

1597499471, 978-1597499477

More Books

Students also viewed these Databases questions

Question

Were they made on a timely basis?

Answered: 1 week ago

Question

Did the decisions need to be made, or had they already been made?

Answered: 1 week ago

Question

When there was controversy, was it clear who had the final say?

Answered: 1 week ago