Question: 4 (a) Appraise the strengths and weaknesses of each of the following firewall deployment scenarios in defending servers, desktop machines, and laptops against network

(a) Appraise the strengths and weaknesses of each of the following firewall deployment scenarios in defending servers, deskto 

4 (a) Appraise the strengths and weaknesses of each of the following firewall deployment scenarios in defending servers, desktop machines, and laptops against network threats. (i) A firewall at the network perimeter (10/100) (ii) Firewalls on every end host machine. (10/100) (iii) A network perimeter firewall and firewalls on every end host machine. (b) Justify the use of a distributed or hybrid IDS (Intrusion Detection System). (10/100) (20/100) (c) Mr. X, the janitor, is recorded on the building security camera taking photocopies of a few documents in the office of the Dean with his mobile phone after he is done cleaning. The security camera film is grainy (from repeated use and re-use) and you cannot ascertain he is taking photocopies of specific documents. You can see him walking back and forth in the area directly in front of the Dean's desk. (i) Recommend proper action for this case. (ii) Justify your action(s) in 4(c)(i). (10/100) (10/100) (iii) Recommend what you can do in the future to prevent or at least mitigate any legal challenges that Mr X, the janitor, may bring to court. (30/100)

Step by Step Solution

3.53 Rating (156 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

4a i A firewall at the network perimeter can be an effective defense against network threats if prop... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!