Question

In: Computer Science

A consulting firm hired you to improve the network security of a Hospital by adding extra...

A consulting firm hired you to improve the network security of a Hospital by adding extra services for defence against external attacks.

1. In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice.

2. You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.

3. Which one of the following can be used to protect a network against unauthorised external connections: VLAN, strong authentication, or an access control list of trusted devices? Justify your answer

Solutions

Expert Solution

1:- In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network we can use strog encryption algorithms because it provides:-

complete data protection :- a complete encryption solution provides businesses and their owners with peace of mind because it protects data in all states – at rest and in transit.

Security Across Multiple Devices :-   with smartphones and other mobile devices gaining popularity in recent years, many companies have struggled to find a solution for keeping the data stored and passed through these devices safe from potential theft. Luckily, data encryption software will allow you to ensure that all data, across any device, is completely encrypted with the same protections in place that you would find in data stored on a desktop computer. Data encryption will help to take an untenable, stressful situation and make it manageable, while providing peace of mind. On top of that, device authentication can eliminate risk of infiltration from unwanted users.

Move Data Securely :- one of the most vulnerable aspects of data emerges during the transport process. While SSL/TLS is the industry standard for data in motion it has many disadvantages for your data security. An effective encryption solution helps to ensure that data is protected at all times, at rest and in motion. Files that are shared or uploaded to cloud systems should be to ensure that the files remain safe throughout the transport process.

Integrity Maintained :- one of the worries that many organizations of all sizes share is whether or not the encryption process will affect the integrity of their data. Although data theft is a very common problem, another way for hackers to commit data fraud is to knowingly alter the data that is available. Encryption keeps your data safe from alterations, and recipients of the data will be able to see if it has been tampered with. Alteration of data is something that many businesses often overlook when they are looking into ways to keep their data safe.

2) The right location to put a firewall packet is the screened subnet with DMZ because in computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks -- usually the public internet. External-facing servers, resources and services are located in the DMZ. Therefore, they are accessible from the internet, but the rest of the internal LAN remains unreachable. This provides an additional layer of security to the LAN as it restricts a hacker's ability to directly access internal servers and data through the internet.

3) strong authentication can be used to protect a network against unauthorised external connections because Strong authentication is any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter


Related Solutions

A consulting firm hired you to improve the network security of a Hospital by adding extra...
A consulting firm hired you to improve the network security of a Hospital by adding extra services for defence against external attacks. 1. In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice. 2. You want to use a packet firewall to protect the Hospital network but you...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks. Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs ➢ Purpose of the Project ➢ Network overview (ex: connecting PCs,...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
Marshall Inc. recently hired your consulting firm to improve thecompany's performance. It has been highly...
Marshall Inc. recently hired your consulting firm to improve the company's performance. It has been highly profitable but has been experiencing cash shortages due to its high growth rate. As one part of your analysis, you want to determine the firm's cash conversion cycle. Using the following information and a 365-day year, what is the firm's present cash conversion cycle?Average inventory = $75,000Annual sales = $600,000Annual cost of goods sold = $360,000Average accounts receivable = $180,000Average accounts payable = $54,000
Marshall Inc. recently hired your consulting firm to improve the company's performance. It has been highly...
Marshall Inc. recently hired your consulting firm to improve the company's performance. It has been highly profitable but has been experiencing cash shortages due to its high growth rate. As one part of your analysis, you want to determine the firm's cash conversion cycle. Using the following information and a 365 day year, what is the firm's present cash conversion cycle? Enter your answer rounded to two decimal places. For example, if your answer is 123.45% or 1.2345 then enter...
You have been hired as a security consultant for a law firm. Which of the following...
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) Wireless Network B) Employees C) Authentication procedures D) Lack of data encryption
A company is interested in the satisfaction of their employees, so they hired a consulting firm...
A company is interested in the satisfaction of their employees, so they hired a consulting firm to conduct an in-house study. Employees were classified into three categories (support staff, analysts and executives) and asked if they felt the company had a healthy work environment. The data: Yes No Support staff 9 32 Analysts 14 37 Executives 12 5 You're interested in whether employee classification has anything to do with attitudes about work environment. For step 1, instead of re-writing this...
Assume that you have just been hired by Adams, Garitty, and Evans (AGE), a consulting firm...
Assume that you have just been hired by Adams, Garitty, and Evans (AGE), a consulting firm that specializes in analyses of firms’ capital structures. Your boss has asked you to examine the capital structure of Campus Deli and Sub Shop (CDSS), which is licates adjacent to the campus. According to the owner, sales were $1,350,000 last year, variable costs were 60% of sales, and fixed costs were $40,000. As a result, EBIT totaled $500,000. Because the university’s enrollmenr is capped,...
As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
Consulting firm Deloitte works with many organizations to improve their business practices. Recently, the firm looked...
Consulting firm Deloitte works with many organizations to improve their business practices. Recently, the firm looked at its own internal processes and determined that its performance management system needed some new life. With over 65,000 employees to rate, the goal was to make the process faster, continuous, and simpler. After gathering information on its current practice and investigating the science behind performance evaluation, Deloitte came up with a revolutionary way forward. The current practice was a traditional method of cascading...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT