You can answer the question on your own time while referencing your course-related materials. You will answer the questions as you as part of the process of composing a network security design.
You will apply network security design concepts and techniques learned in chapters 1 – 7 of your Microsoft textbook to answer questions. You must complete each question in a freeform essay format using complete sentences within constructed paragraphs. It consists of seven questions with each question corresponding to one of the first seven chapters in your textbook. Each numbered question will contain additional parts. Questions 1 through 6 are worth 15 points each while question 7 is worth 10 points each.
1. You learned in chapter 1 the security threats and vulnerabilities you need to consider when proposing a network security design. I want you to discuss how you will take into consideration the following chapter 1-related topics in your proposed network security design. Each letter question below is worth 3 points for an accumulated total of 15 points for the numeric question.
1. At least 3 principles of information security design
2. How you would apply Defense-In-Depth
3. How you would apply at least 2 out of the 10 Security Domains
4. Describe types of assets you would have to protect.
5. Describe threats, threat agents, and vulnerabilities you will need to consider
2. We learned in chapter 2 how to analyze risk through a phased risk management approach. I want you to discuss how you will take into consideration the following chapter 2-related topics in your proposed network security design. Each letter question below is worth 5 points for an accumulated total of 15 points for the numeric question.
a. Describe who will be part of your Security Risk Management team
b. For Phase 1 Step 2, inventory and qualitative valuate at least 3 assets including tables 2-1, 2-2, and 2-3 format structure in your answer.
c. Complete Phase 1 Steps 3-5, which include listing and qualitative valuate at least 3 threats and vulnerabilities. You must use tables 2-4 and 2-5 as well as figure 2-2 as part of your answer.
3. We learned in chapter 3 how to assess the risk of software vulnerabilities and use different technologies for distributing Microsoft security updates on your network. Applying what you learned in chapter 3 towards your proposed network security design, answer the following questions. Each letter question below is worth 5 points for an accumulated total of 15 points for the numeric question.
a. Apply at least 3 of the useful software vulnerability countermeasures discussed on pages 84-88
b. Discuss in detail your proposed process of updating network software
c. Select at least 3 patch distribution methods you would use and discuss why you choose them.
4. We learned in chapter 4 how to design a network security infrastructure. Applying what you learned in chapter 4 towards your proposed network security design, answer the following questions. Each letter question below is worth 5 points for an accumulated total of 15 points for the numeric question.
a. Select at least 3 network management tools and provide your rationale for your selection.
b. Propose a management network architecture you would use
c. Provide guidelines you will use to manage administrators as well as administrative rights.
5. We learned in chapter 5 how to design Active Directory security. Applying what you learned in chapter 5 towards your proposed network security design, answer the following questions. Each correct letter question will be worth up to 3 points for an accumulated total of 15 points for the numeric question.
a. Discuss which authentication protocols you would use in your proposed network security design
b. Discuss Security Policy settings (table 5.3) you would use for proposed network security design Kerberos Ticket Policy
1. Discuss which security policy settings for strong passwords you would choose to use for all settings listed in table 5-4.
2. Identify and explain which forest model you would apply
3. Identify and explain which domain model you would apply
6. We learned in chapter 6 how to protect data such as file systems, Active Directory access, and printers. Applying what you learned in chapter 6 towards your proposed network security design, answer the following questions. Each correct letter question will be worth up to 3 points for an accumulated total of 15 points for the numeric question.
1. Discuss how you would apply group scope
2. Discuss which built-in groups you would use
3. Discuss your group naming convention
4. Discuss best practices you would apply for designing permissions
5. Discuss how you would delegate administrative rights
7. We learned in chapter 7 how to make servers more secure. Applying what you learned in chapter 7 towards your proposed network security design, answer the following questions. Each correct letter question will be worth up to 5 points for an accumulated total of 10 points for the numeric question.
1. Discuss which security templates you would apply
2. Discuss how you would harden your DNS and SQL servers
No comments:
Post a Comment