Search for question
Question

In response to your peers, connect their solutions to the application of the CIA triad or Fundamental Security Design Principles (FSDPs). For reference, refer to the CIA Triad and Fundamental

Security Design Principles document. For your response posts, do the following: Reply to at least two classmates outside of your own initial post thread. • In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern. ● ● • In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local time zone. ● ● • Demonstrate more depth and thought than saying things like "I agree" or "You are wrong." Guidance is provided for you in the discussion prompt. Criteria Discussion Rubric Proficient Exemplary Comprehension Develops an initial post with an organized, clear point of view or idea using rich and significant detail (100%) Develops an initial post with a point of view or idea using adequate organization and detail (85%) Needs Improvement Develops an initial post with a point of view or idea but with some gaps in organization and detail (55%) Not Evident Does not develop an initial post with an organized point of view or idea (0%) Criteria Timeliness Engagement Writing (Mechanics) N/A Exemplary Provides relevant and meaningful response posts with clarifying explanation and detail (100%) Writes posts that are easily understood, clear, and concise using proper citation methods where applicable with no errors in citations (100%) Needs Improvement Submits initial post on time Submits initial post one day (100%) late (55%) Proficient Provides relevant response posts with some explanation and detail (85%) Provides somewhat relevant response posts with some explanation and detail (55%) Writes posts that are easily | Writes posts that are understood using proper citation methods where applicable with few errors in citations (85%) First Response understandable using proper citation methods where applicable with a number of errors in citations (55%) Not Evident Submits initial post two or more days late (0%) Provides response posts that are generic with little explanation or detail (0%) Writes posts that others are not able to understand and does not use proper citation methods where applicable (0%) 3-1 Discussion: Security of IP Routing Protocols Russell Hawkinslf these companies had such a hard time getting it perfect, what chance does anyone else have? The answer to this question is not as difficult as I thought at first. No one can get it perfectly. Cyber security is alive and as the attackers change how they approach; Total we must change to meet these attacks. Having a security team is best if all the team members are vigilant and stay on top of new trends and avenues of attack and respond accordingly. If money hasn't been the solution, what is? Training and awareness are the only solutions that will help when speaking of security. As stated above, being aware of your network and the vulnerabilities it has is crucial. This goes hand in hand with staying vigilant of new threats and avenues of attack and making changes to the network to adjust for these changes. 2nd Response 3-1 Discussion Chauncey Sims In analyzing the resource Security of IP Routing Protocols question "if these companies had such a hard time getting it perfect, what chance does anyone else have?", I had to use my experience both in cybersecurity learning and as a former police officer. The answer is clear, perfection is an elusive goal. You can't buy perfection which eliminates money as the solution, and for every IDS intrusion detection tool or technique, there are multiple hackers that spend hours seeking exploit techniques to subvert them. This makes protection perfection next to impossible. I believe that the reason for this reality is that security, monitoring, responses all have an imperfect element, humans. Technology is an ever growing and evolving entity that can change from state-of-the-art to antiquated overnight. The best anyone can hope for during this evolution is mitigation and minimization, as perfection is next to impossible. To underscore the challenge of achieving perfection, consider the United States, boasting the world's wealthiest economy (Forbes India, 2024) and spending over $190 billion in law enforcement. Despite these significant resources, the notion of perfection in preventing crime and ensuring citizen security is knowingly false. The best that can be realistically accomplished is the mitigation and minimization of criminal activities. Having made the case for perfection being impossible, organizations and small businesses can adopt a combination of technical solutions, best practices, and continued monitoring as a part of their financial investments in securing Ip routing protocols. This includes but is not limited to: Authentication mechanisms - protocols such as BGP (Border Gateway Protocol) Encryption of routing protocols (IPsec) — an added layer of security Network Segmentation - creating different security zones to contain security breaches. Security Training and Awareness to address the human factor and prevent social engineering. By implementing this combination of IP routing protocols companies can effectively minimize and mitigate their infrastructure's vulnerability to potential threats and attacks. References Forbes India. (2024). Top 10 Largest Economies in the World. Forbes India, 1-3.