Chapter 5 Q&A
1: | What is the difference between a closed network and an open network? | |
A1: | Answer: A closed network is typically designed and implemented in a corporate environment. A closed network provides connectivity only to known parties and sites without connection to public networks. In contrast, an open network is designed with availability to the Internet and public networks. | |
2: | Define a security policy. | |
A2: | Answer: A security policy is a formal statement of rules that must be obeyed by people who are given access to an organization's technology and information assets. | |
3: | Name three reasons why a company should have a security policy. | |
A3: | Answer: A company should have a security policy for the following reasons:
| |
4: | Name at least four key components that a good security policy should contain. | |
A4: | Answer: A good security policy should contain the following key components:
| |
5: | Name the two philosophies that can be adopted when defining a security plan. | |
A5: | Answer: The first model, which is called the deny all model, is generally more secure than the allow all model. It is, however, more work intensive to successfully implement than the allow all model. The allow all model is much easier to implement, but it is generally less secure that the deny all model. | |
6: | Which individuals should be involved when creating a security policy? | |
A6: | Answer: The following individuals should be involved when creating a security policy:
| |
7: | Give the four stages of the security wheel. | |
A7: | Answer: The four stages of the security wheel are Secure, Monitor, Test, and Improve. | |
8: | Which security solutions can be implemented to stop or prevent unauthorized access and to protect information? | |
A8: | Answer:Authentication The recognition and the mapping to the policy of each individual user's identity, location, and the exact time logged on to the system.Encryption A method for ensuring the confidentiality, integrity, and authenticity of data communications across a network.Firewalls A set of related services, located at a network gateway, that protects the resources of a private network from users from other networks. Firewalls can also be standalone devices or can be configured on most routers.Vulnerability patching The identification and patching of possible security holes that could compromise a network and the information available on that network. | |
9: | Explain the monitoring phase of the security wheel. | |
A9: | Answer: After a network is secure, it has to be monitored to ensure that it stays secure. Network vulnerability scanners can proactively identify areas of weakness, and IDSs can monitor and respond to security incidents as they occur. Using these security monitoring solutions, organizations can obtain unprecedented visibility into the network data stream and the security posture of the network. | |
10: | Write a security policy (similar to the VPN policy) for password protection.A10: | Answer:Security Policy for Password ProtectionOverview Passwords are an important aspect of security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of XYZ's entire corporate network.Purpose The purpose of this policy is to establish a standard for creating strong passwords, the protection of those passwords, and the frequency of change.Scope The scope of this policy includes all personnel who have or are responsible for an account on any system that belongs to XYZ.Policy |