Search for question
Question

4-1 Discuswsion:Hot-Based and Network-Based Firewalls Response Posts In response to your peers, choose one of the following Fundamental Security Design Principles: Simplicity of design • Trust relationships • Defense in depth Discuss how the two principles work together to improve security when the selected firewall type is employed. To complete this assignment, review the Discussion Rubric. For your response posts, do the following: • Reply to at least two classmates outside of your own initial post thread. • In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern. • In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local time zone. • Demonstrate more depth and thought than saying things like "I agree" or "You are wrong." Guidance is provided for you in the discussion prompt. Discussion Rubric Criteria Comprehension Timeliness Engagement Writing (Mechanics) Exemplary Develops an initial post with an organized, clear point of view or idea using rich and significant detail (100%) N/A Provides relevant and meaningful response posts with clarifying explanation and detail (100%) Writes posts that are easily understood, clear, and concise using proper citation methods where applicable with no errors in citations (100%) Proficient Develops an initial post with a point of view or idea using adequate organization and detail (85%) Needs Improvement Develops an initial post with a point of view or idea but with some gaps in organization and detail (55%) Submits initial post on time Submits initial post one day (100%) Provides relevant response posts with some explanation and detail (85%) Writes posts that are easily understood using proper citation methods where applicable with few errors in citations (85%) late (55%) Provides somewhat relevant response posts with some explanation and detail (55%) Writes posts that are understandable using proper citation methods where applicable with a number of errors in citations (55%) Not Evident Does not develop an initial post with an organized point of view or idea (0%) Submits initial post two or more days late (0%) Provides response posts that are generic with little explanation or detail (0%) Writes posts that others are not able to understand and does not use proper citation methods where applicable (0%) Response One and Two: Total View profile card for Kate Midgley 4-1 Discussion: Host-Based and Network-Based Firewalls Kate Midgley Network-based firewalls and the Fundamental Security Design Principle of isolation work together by strategically configuring access control policies and segmenting the network. The firewalls create isolated zones that compartmentalize different parts of the network environment, while critical systems can be separated from less secure areas (such as guest networks or untrusted external connections) through segmentation. This isolation prevents unauthorized access and contains the impact of security incidents by limiting lateral movement within the network; this is because each segment acts as a distinct zone with its own set of security rules and access controls and it effectively creates a barrier between different parts of the network. Network-based firewalls also often include VPN capabilities and allows for secure remote access while maintaining isolation. between external and internal networks. By using VPNs, the organization can offer a secure way to get through network-based firewalls so remote users can access internal resources while preserving the isolation between external and internal networks. 4-1 Discussion: Host-Based and Network-Based Firewalls Kate Midgley Network-based firewalls and the Fundamental Security Design Principle of isolation work together by strategically configuring access control policies and segmenting the network. The firewalls create isolated zones that compartmentalize different parts of the network environment, while critical systems can be separated from less secure areas (such as guest networks or untrusted external connections) through segmentation. This isolation prevents unauthorized access and contains the impact of security incidents by limiting lateral movement within the network; this is because each segment acts as a distinct zone with its own set of security rules and access controls and it effectively creates a barrier between different parts of the network. Network-based firewalls also often include VPN capabilities and allows for secure remote access while maintaining isolation between external and internal networks. By using VPNs, the organization can offer a secure way to get through network-based firewalls so remote users can access internal resources while preserving the isolation between external and internal networks.