Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 4RQ
Program Plan Intro
Trusted network:
A trusted network is a network of devices that are connected to each other, open only to approved users and permits transmission only for protected data. It includes the following features
- Authentication
- Encryption
- Firewall
- Private Network.
Untrusted network:
Untrusted networks are situated outside the security perimeter and control the network admin. They could even be a private or a shared network. It includes the following characteristics
- Loosely maintained
- Unmonitored
- Readily compromised from the outside network.
Firewall:
- Firewall is a hardware or software program which is used to permit files to arrive in the network based on the privacy.
- It is present at the gateway of the network, used to protect the traffic flow and privacy in the network.
- It is a tool for a network to protect from illegal access from the private network.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What is the normal relationship between an untrusted network, a firewall, and a trusted network, and how do they interact with one another?
In a typical scenario, how do a trusted network, an untrusted network, and a firewall relate to one another and how do they function together?
How are the untrusted network, the firewall, and the trustworthy network normally connected?
Chapter 12 Solutions
Management Of Information Security
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 2ECh. 12 - Prob. 3ECh. 12 - Prob. 4ECh. 12 - Prob. 5ECh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQ
Knowledge Booster
Similar questions
- Is there a typical link between a network that cannot be trusted, a firewall, and a network that can be trusted, and how does this connection function?arrow_forwardIs there an usual connection between an untrusted network, a firewall, and a trustworthy network, and how does this work?arrow_forwardGive an explanation for what the word "firewall" means in terms of network security, and describe how it is employed in network topologies.arrow_forward
- What does the phrase "firewall" mean in terms of network security, and how is it used in network topologies?arrow_forwardWhat does the phrase "firewall" mean in terms of network security, and how is it employed in network topologies?arrow_forwardGive an explanation of what the term "firewall" implies in terms of network security, and discuss how it is used in different topologies for network configurations.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning