DISCUSSION 3

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

210

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by ProfessorHeat17493

Report
Before you complete your initial post, read Section 1.2 in the "Security of IP Routing Protocols" resource. In your post, analyze this question from the document: "If these companies had such a hard time getting it perfect, what chance does anyone else have?" Although this was written in 2001, many of the identified exploits still exist. If money hasn't been the solution, what is? Justify a possible solution. Include network security and IP routing and configuration in your discussion. I think the solution to exploits from happening as often as they do is by following the CIA triad. If they followed the CIA triad, they would be limiting the attacks on networks probably by a little bit. Also, by having a virtual routing and forwarding technology it could send that information through multiple routing tables on one router. By using VPNs and Antivirus software. Also, by staying informed of things that happened at other companies, always monitoring the network for threats, and making sure everything has the latest patches. Doing these steps, I do believe would make it the difference of easy attacks on the companies. 10:15 let her out In response to your peers, connect their solutions to the application of the CIA triad or Fundamental Security Design Principles (FSDPs). For reference, refer to the CIA Triad and Fundamental Security Design Principles document. Hi Logan, I agree with you that there should be regular tests to see if there’s a vulnerability in the network and that the staff should be educated about all the threats and make sure that the management reduces all the inconsistencies. Your example of having zero trust relates to the CIA triad since that is making sure people have certain restrictions on what they can do. Hi Sterling,
I agree with you that there should be multiple people checking the security of the business to make sure there is no vulnerability in the system. But on the other hand, that would require more money since you are making multiple people check the same thing. Your example relates to the CIA triad by how you are giving authorized users access to one thing. Your example relates to layering in the Fundamental Security Design document.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help