Discussion Questions

Read Complete Research Material



Discussion Questions



Discussion Questions

Security Architecture and Design

Q-1 Assess, from a management perspective, the different types of security models and their implications to protect the organization's assets. Identify the one model you believe is the most versatile and describe why.

There are various types of security models for organizations to ensure the data protection and assets. Among all of them, the use of “Firewalls” is the best options for organizations today to enhance the data protection. The firewall is an appellation which is common in the world of computers. It is considered as an best barrier for protecting the computer against attacks and intrusions from across the network, it is generally included in a security suite, it is quite different in the professional sphere where the computer have several types of solution.

A firewall is a physical device (hardware) or logical (software) which is used as a protection system for computers. It can also serve as an interface between one or more enterprise networks to monitor and possibly block the flow of data by analyzing the information contained in the data stream (network partitioning). The firewall works as a filter for the organizational network packets. A company that has a file server for the internal network and wants that it is not accessible from the internet could actually use a firewall to block communications (Vacca, 2005).

Q-2Choose one security architecture type and describe what it protects in terms of confidentiality, integrity, availability, authenticity, non-repudiation, identification, or authorization.

The suitable security architecture for any organization can be “Firewalls”. It can often be used to protect the organization intranet segments. Security of the site is important for the daily activities of the organization. This requires that the firewall administrator should truly understand the principles of networking technologies and their implementation. For example, since most firewalls made to ...
Related Ads