We can work on Firewall security strategy

Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is granted. Integrity of data is the top priority.

You are considering security through obscurity, defense in depth, and diversity of defense.

Answer the following question(s):

Which firewall security strategy would be the best solution for the scenario? Why?

find the cost of your paper
facebookShare on Facebook


FollowFollow us

Sample Answer

The best firewall security strategy for the scenario is defense in depth. This is because defense in depth involves using multiple layers of security to protect your network. This makes it more difficult for attackers to penetrate your defenses.

In this scenario, you could use a combination of firewalls, intrusion detection systems (IDS), and antivirus software to implement a defense in depth strategy. You could also use security policies and procedures to help protect your network.

Full Answer Section

Security through obscurity is not a good security strategy because it relies on the attacker not knowing about your security measures. This is not a reliable strategy because attackers are constantly looking for new ways to exploit vulnerabilities.

Diversity of defense is a good security strategy, but it is not enough on its own. You need to use multiple layers of security to protect your network.

The following are some of the benefits of using a defense in depth strategy:

  • It makes it more difficult for attackers to penetrate your defenses.
  • It provides redundancy in case one layer of security fails.
  • It allows you to focus on different aspects of security.

Here are some of the specific security measures you could use to implement a defense in depth strategy in your scenario:

  • Firewalls: Firewalls can be used to block unauthorized traffic from entering your network.
  • IDS: IDS can be used to detect malicious traffic that has entered your network.
  • Antivirus software: Antivirus software can be used to protect your computers from malware.
  • Security policies and procedures: Security policies and procedures can help to protect your network by defining how users should access and use your network resources.

By implementing a defense in depth strategy, you can help to protect your network from attack and ensure the integrity of your data.

This question has been answered.

Get Answer

Is this question part of your Assignment?

We can help

Our aim is to help you get A+ grades on your Coursework.

We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals

Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples