Question

In: Computer Science

What will you review and assess within the LAN-to-WAN Domain as part of this security assessment?

What will you review and assess within the LAN-to-WAN Domain as part of this security assessment?

Solutions

Expert Solution

Answer:

Major device which is present in this domain is router. This is the only domain where all data enters or exits through internet. So lots of threat and vulnerabilty are associated with this domain. This domain contains all physical and logical system of securities. It is one of the most important domain which needs to be secured in the whole Infrastructure. DMZ(Demilitarized zone) which is the segment of LAN in the domain of LAN to WAN that plays role in managing traffic.

Threat and vulnerability associated with this domain and their mitigation:-

  • LAN is accessible to unauthorized: This can be mitigated by securing data centers and being sure of data closets. And by Avoiding entry with improper ID.
  • Data and system are accessible to unauthorized: This can be mitigated by changing the policies of accessing data and systems according to the guidelines which keep the system and data secure. This can be done by applying multi-level indentity check to access the systems and data.
  • Vulnerability in OS software: To mitigate this there should be a time to time assessment for checking bugs and error in software.

Related Solutions

What will you review and assess within the Workstation Domain as part of this security assessment?
What will you review and assess within the Workstation Domain as part of this security assessment?
What will you review and assess in the User Domain as part of this security assessment?
What will you review and assess in the User Domain as part of this security assessment?
What will you review within the System/Applications Domain as part of your security assessment?
What will you review within the System/Applications Domain as part of your security assessment?
Explain the role of LAN, WAN, and VPN when it comes to health IT. What is...
Explain the role of LAN, WAN, and VPN when it comes to health IT. What is the difference between LAN and WAN?
How does a WAN differ from a LAN and what must be taken into consideration in...
How does a WAN differ from a LAN and what must be taken into consideration in terms of communications media? Support your rationale.
Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...
Part 2: Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
What is the primary goal of the vulnerability assessment and remediation domain of the maintenance model?
What is the primary goal of the vulnerability assessment and remediation domain of the maintenance model? Is this important to an organization with an Internet presence? Why?
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
what assessment is done in a ventilator ? assess the ventilator for leaks - describe the...
what assessment is done in a ventilator ? assess the ventilator for leaks - describe the graphics , types of alarms and how is fixed. Explain potential sites for leaks
Develop a process to assess the security posture of the service provider. What security requirements should...
Develop a process to assess the security posture of the service provider. What security requirements should your organization have? Define security requirements in a cloud-based environment that should be part of your standard.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT