NT2580: Week 4 Hardening a Network
Analysis 4.2
Availability, Integrity, or Confidentiality (A-I-C)
Instructions:
Given the network security applications and countermeasures in
the first column of the table below, explore answers to the
following questions:
· Where does the countermeasure belong in the seven domains
of a typical IT infrastructure?
· What CIA functions does the countermeasure provide?
Provide your answers in the table below.
Network Security Applications and Countermeasures
Domains
CIA Function
Ethical hacker
Intrusion detection system/intrusion prevention system
(IDS/IPS)
Access controls
Failover server
Automatic updates
Cryptography
Data backups
Logon rights
Computer cluster
Firewalls
Proxies
Antivirus scanners
As a reminder, the seven domains of a typical IT infrastructure
include the following domains:
1. User Domain: Actual users
1. Workstation Domain: Workstations, laptops, and end-point
devices, such as smartphones and printers
1. LAN Domain: Physical and logical LAN technologies—100
Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless
LAN technologies—used to support workstation connectivity to
the organization’s network infrastructure
1. LAN-to-WAN Domain: Routers, firewalls, demilitarized
zones (DMZs), and IDS/IPS
1. WAN Domain: Routers, circuits, switches, firewalls,
gateways, and equivalent gear at remote locations, sometimes
under a managed service offering by the service provider
1. Remote access Domain: Virtual private networks (VPNs),
laptops with VPN software, and secured socket layer/VPN
(SSL/VPN) tunnels
1. System/Application Domain: Hardware, operating system
software, database software, client/server applications, and data
that are typically housed in the organization’s data center and
computer rooms
Representation of the Seven Domains of a Typical IT
Infrastructure
1

NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx

  • 1.
    NT2580: Week 4Hardening a Network Analysis 4.2 Availability, Integrity, or Confidentiality (A-I-C) Instructions: Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions: · Where does the countermeasure belong in the seven domains of a typical IT infrastructure? · What CIA functions does the countermeasure provide? Provide your answers in the table below. Network Security Applications and Countermeasures Domains CIA Function Ethical hacker Intrusion detection system/intrusion prevention system (IDS/IPS) Access controls Failover server Automatic updates Cryptography
  • 2.
    Data backups Logon rights Computercluster Firewalls Proxies Antivirus scanners As a reminder, the seven domains of a typical IT infrastructure include the following domains: 1. User Domain: Actual users 1. Workstation Domain: Workstations, laptops, and end-point devices, such as smartphones and printers 1. LAN Domain: Physical and logical LAN technologies—100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN technologies—used to support workstation connectivity to the organization’s network infrastructure 1. LAN-to-WAN Domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS 1. WAN Domain: Routers, circuits, switches, firewalls, gateways, and equivalent gear at remote locations, sometimes under a managed service offering by the service provider 1. Remote access Domain: Virtual private networks (VPNs), laptops with VPN software, and secured socket layer/VPN (SSL/VPN) tunnels
  • 3.
    1. System/Application Domain:Hardware, operating system software, database software, client/server applications, and data that are typically housed in the organization’s data center and computer rooms Representation of the Seven Domains of a Typical IT Infrastructure 1