DISCUSSION 3
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
210
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by ProfessorHeat17493
Before you complete your initial post, read Section 1.2 in the
"Security of IP Routing Protocols" resource. In your post,
analyze this question from the document: "If these companies
had such a hard time getting it perfect, what chance does
anyone else have?" Although this was written in 2001, many
of the identified exploits still exist. If money hasn't been the
solution, what is? Justify a possible solution. Include network
security and IP routing and configuration in your discussion.
I think the solution to exploits from happening as often as they
do is by following the CIA triad. If they followed the CIA triad,
they would be limiting the attacks on networks probably by a
little bit. Also, by having a virtual routing and forwarding
technology it could send that information through multiple
routing tables on one router. By using VPNs and Antivirus
software. Also, by staying informed of things that happened at
other companies, always monitoring the network for threats,
and making sure everything has the latest patches. Doing
these steps, I do believe would make it the difference of easy
attacks on the companies.
10:15 let her out
In response to your peers, connect their solutions to the
application of the CIA triad or Fundamental Security Design
Principles (FSDPs). For reference, refer to the CIA Triad and
Fundamental Security Design Principles document.
Hi Logan,
I agree with you that there should be regular tests to see if there’s a
vulnerability in the network and that the staff should be educated about all
the threats and make sure that the management reduces all the
inconsistencies. Your example of having zero trust relates to the CIA triad
since that is making sure people have certain restrictions on what they can
do.
Hi Sterling,
I agree with you that there should be multiple people checking the security
of the business to make sure there is no vulnerability in the system. But on
the other hand, that would require more money since you are making
multiple people check the same thing. Your example relates to the CIA triad
by how you are giving authorized users access to one thing. Your example
relates to layering in the Fundamental Security Design document.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help