Module 1 Assessment: Goals of a Network Security Program
Module Outcomes addressed in this assessment:
- Explain the five goals of a network security program.
- Discuss threat levels and target values of a network attack.
CourseOutcome addressed in this assessment:
IT390M1-1:Discuss intrusion detection and incident response principles and concepts.
The goals of a security program come from an analysis of risks and an assessment of the resources that you want to protect. In this assessment, you will explore essential concepts related to the development of this initiative.
Answer and provide a brief explanation (20–50 words) for each of the following five questions using a scholarly source cited in APA format per question.
- A ____________ is a network that uses a public network to provide access to a secured private network.
- True or False: A restrictive policy on a firewall denies all traffic by default, and only specifically allowed traffic is permitted into the network.
- ____________ is the ability to log and trace any performed action over a secured network, preventing a participant from denying it performed an action.
- Antivirus software and IDPSs are similar in that both make use of ____________ to identify threats.
- security patches
- Which access control method relies on access being defined in advance by system administrators?
- role-based access control (RBAC)
- discretionary access control (DAC)
- mandatory access control (MAC)
Part2:TheGoals of a Network Security Program
Answer and provide a 200- to 300-word explanation for each of the following two questions using a scholarly source cited in APA format per question.
- There are five goals of a network security program. Describe each.
- There are six motivations behind cyber-attacks. Summarize the six motivations that compel individuals and groups to attack a network.
Consider the following and respond in 200–300 words using a scholarly source cited in APA format per question:
- There are 11 attack attributes. Describe each attack attribute and categorize the level of threat each attack poses.
- What is meant by target value? Describe two target values.
Answers contain sufficient information and supporting references to adequately answer the questions and contain no spelling, grammar, or APA errors. For more information on APA style formatting, go to Academic Writer under Academic Tools of this course.
- his assessment should be a Microsoft Word document, in addition to the title and reference pages.
- Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your submission should be highly organized, logical, and focused.
- Your submission should provide a clearly established and sustained viewpoint and purpose.
- Your writing should be well ordered, logical, and unified, as well as original and insightful.
- Your submission must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics.
- A separate page at the end of your submission should contain a list of references in APA format. Use your textbook, the Library, and the internet for research.
- Be sure to include references for all sources and to cite them using in-text citations where appropriate. Your sources and content should follow current APA citation style. Review the writing resources for APA formatting and citation found in Academic Tools. Additional writing resources can be found within the Academic Success Center.
- Your submission should:
- include a title page.
- be double-spaced.
- be typed in Times New Roman, 12 -point font; and
- be free of spelling or punctuation errors.