4 1 discuswsion hot based and network based firewalls response posts i
Search for question
Question
4-1 Discuswsion:Hot-Based and Network-Based Firewalls Response Posts
In response to your peers, choose one of the following Fundamental Security Design Principles:
Simplicity of design
•
Trust relationships
•
Defense in depth
Discuss how the two principles work together to improve security when the selected firewall type is
employed.
To complete this assignment, review the Discussion Rubric.
For your response posts, do the following:
•
Reply to at least two classmates outside of your own initial post thread.
• In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.
• In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of
your local time zone.
• Demonstrate more depth and thought than saying things like "I agree" or "You are wrong."
Guidance is provided for you in the discussion prompt.
Discussion Rubric Criteria
Comprehension
Timeliness
Engagement
Writing (Mechanics)
Exemplary
Develops an initial post with
an organized, clear point of
view or idea using rich and
significant detail (100%)
N/A
Provides relevant and
meaningful response posts
with clarifying explanation
and detail (100%)
Writes posts that are easily
understood, clear, and
concise using proper citation
methods where applicable
with no errors in citations
(100%)
Proficient
Develops an initial post
with a point of view or idea
using adequate
organization and detail
(85%)
Needs Improvement
Develops an initial post with a
point of view or idea but with
some gaps in organization and
detail (55%)
Submits initial post on time Submits initial post one day
(100%)
Provides relevant response
posts with some
explanation and detail
(85%)
Writes posts that are easily
understood using proper
citation methods where
applicable with few errors
in citations (85%)
late (55%)
Provides somewhat relevant
response posts with some
explanation and detail (55%)
Writes posts that are
understandable using proper
citation methods where
applicable with a number of
errors in citations (55%)
Not Evident
Does not develop an
initial post with an
organized point of view
or idea (0%)
Submits initial post two
or more days late (0%)
Provides response posts
that are generic with little
explanation or detail
(0%)
Writes posts that others
are not able to understand
and does not use proper
citation methods where
applicable (0%)
Response One and Two:
Total View profile card for Kate Midgley
4-1 Discussion: Host-Based and Network-Based Firewalls
Kate Midgley
Network-based firewalls and the Fundamental Security Design Principle of isolation work together
by strategically configuring access control policies and segmenting the network. The firewalls
create isolated zones that compartmentalize different parts of the network environment, while
critical systems can be separated from less secure areas (such as guest networks or untrusted
external connections) through segmentation. This isolation prevents unauthorized access and
contains the impact of security incidents by limiting lateral movement within the network; this is
because each segment acts as a distinct zone with its own set of security rules and access controls
and it effectively creates a barrier between different parts of the network. Network-based firewalls
also often include VPN capabilities and allows for secure remote access while maintaining isolation.
between external and internal networks. By using VPNs, the organization can offer a secure way to
get through network-based firewalls so remote users can access internal resources while
preserving the isolation between external and internal networks. 4-1 Discussion: Host-Based and Network-Based Firewalls
Kate Midgley
Network-based firewalls and the Fundamental Security Design Principle of isolation work together
by strategically configuring access control policies and segmenting the network. The firewalls
create isolated zones that compartmentalize different parts of the network environment, while
critical systems can be separated from less secure areas (such as guest networks or untrusted
external connections) through segmentation. This isolation prevents unauthorized access and
contains the impact of security incidents by limiting lateral movement within the network; this is
because each segment acts as a distinct zone with its own set of security rules and access controls
and it effectively creates a barrier between different parts of the network. Network-based firewalls
also often include VPN capabilities and allows for secure remote access while maintaining isolation
between external and internal networks. By using VPNs, the organization can offer a secure way to
get through network-based firewalls so remote users can access internal resources while
preserving the isolation between external and internal networks.