Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The architecture of today's networks is highly complex, with scalability, resiliency, and security at its forefront all to combat the evolving cyber threat landscape. Cyber

The architecture of today's networks is highly complex, with scalability, resiliency, and security at its forefront all to combat the evolving cyber threat landscape.
Cyber attackers are constantly changing and advancing their tactics, techniques, and procedures (TTPs) to bypass controls and identify and exploit vulnerabilities. Unfortunately, a growing challenge for network security administrators is that these vulnerabilities can exist in various areas of the organization's environment, including hardware devices, data, applications, users, etc.
Furthermore, to ensure adequate coverage in the different regions of the environment, network security administrators utilize many network security technologies and applications to identify, protect, detect, respond to, and recover from threats.
For this activity, you will further research some of the different types of network devices and network security concepts an administrator might be responsible for.
Choose five network security technologies from the Secure Network Technologies And Concepts list below. Then, for each, research and answer the following:
What role does this technology or concept play in network security? Explain its impact and importance to a network security administrator and an organization's security apparatus.
How does this technology function? How does it recognize threats (i.e., heuristics, signature, behavior, data mining, sandbox)? And how can an attacker try to bypass it?
Which of the five functions of the NIST Cybersecurity Framework (identify, protect, detect, respond, recover) does this technology involve? Note that technology may operate in multiple functions depending on its configuration. If that is the case, please explain.
Post your response to share your research on network security technologies with your peers.
Secure Network Technologies And Concepts
Access Control List
Data Loss Prevention (DLP)
Demilitarized Zone (DMZ)
Email Security Gateway
Firewall
Flood Guards
IDS/IPS (Intrusion Detection/Prevention System)
Load Balancer
Loop Protection
Network Access Control (NAC)
Network Proxy
Network Segregation/Segmentation
Port Security
Routers
Security Information And Event Management (SIEM)
Software Defined Network (SDN)
Unified Threat Management
Virtual Private Networks (VPNs)
VLAN (Virtual Local Area Network)
Wireless Security

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

3rd Edition

0128012757, 978-0128012758

More Books

Students also viewed these Databases questions

Question

What has been your desire for leadership in CVS Health?

Answered: 1 week ago

Question

Question 5) Let n = N and Y Answered: 1 week ago

Answered: 1 week ago