standard layer 3 diagram includes firewalls W r i t i n g

standard layer 3 diagram includes firewalls W r i t i n g

After reading chapter 4, reviewing the PowerPoint slides, and watching the videos (and other readings if present) discuss the following:

Documenting a network is essential in troubleshooting and support. Discuss the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?

General guidelines for all class discussions:

  • You are responsible to the your Discussion 150 World , You are responsible to post (A (50 Word) )responsible to post (B (50 Word))at minimum.
  • Post a thorough, grammatically sound response that pertains to the course material
  • You are required to respond to at least two of your classmate’s original posts. They are to be thought provoking responses. In other words, your reply needs to be more detailed than “Great job,” or “I like what you said here.” Responses are due.
  • It is critical that you are forthright and genuine with your opinions when it comes to participating in our class discussions. However, it is essential that you tie your opinions into the literature and substance of the topics being covered within the class for that particular week. In other words, your responses should allude to, and suggest a sort of understanding/comprehension of the material being covered in class for that period of time.

Additional requirements:

  • Supplement the textbook information with at least one other source.
  • Do not use the following sources:
    • Wikipedia – no wiki pages at all.
    • Ask.com
    • Yahoo Answers
    • InfoPlease
    • E-How
  • Follow APA Guidelines.
  • Make sure to cite all sources appropriately. (Don’t forget to use quotation marks.)
    • If the work is plagiarized, your grade will be a 0.
    • Remember if what you write is not your words, thoughts, or ideas you must cite the source and quote appropriately.
  • If classmates post to your original discussion, it is important that you respond to their postings.

Click here for help on how to cite sources in APA Style from the SWOSU Library. (Links to an external site.) (Links to an external site.) (Links to an external site.) (Links to an external site.)

Click here for further help on APA Guidelines. (Links to an external site.) (Links to an external site.)

responsible to post (A)

A- The biggest security implication is if someone gains access to your documentation, they know almost everything about your network. If a hacker had your IP and server list this will allow them to target an attack on the important pieces of equipment on your network. Also if you include a security diagram this could help them bypass your security equipment and protocols. “The standard Layer 3 diagram includes firewalls, but the security diagram needs to also include any special security probes, IDS/IPS devices and passive or active taps.” I think that only employees that are working in the IT department should have access to these documents, and even then should only have access to the ones that pertain to their duties. There should also only be certain people that are allowed to update information to prevent incorrect data being entered.

Reference: https://

responsible to post (B)

When it comes to network documentation, it can be difficult to keep outside users away from seeing the network setup. A company would only like a select few to see the documentation to a network and keep unauthorized users away from the structure. Posey (2003) described network documentation protection by creating a security operations guide, as “creating a security operations guide allows you to document every element of your security policies for both users and administrators” (para. 1). By creating a user guide to the network, limiting physical access to documentation, implementing firewalls to keep hackers away, and making sure security templates are in place even in the workplace, “you remain vigilant on all fronts—and a good security operations guide will help you do just that” (para. 2-26).

Source:

Posey, B. (2003, October 28). Network documentation must include a security operations guide. Retrieved from https://