Module 1 Assessment: Goals of a Network Security ProgramModule Outcomes addressed in this assessment:Explain the five goals of a network security program.Discuss threat levels and target values of a...

1 answer below »

Module 1 Assessment: Goals of a Network Security Program

Module Outcomes addressed in this assessment:

  • Explain the five goals of a network security program.

  • Discuss threat levels and target values of a network attack.

CourseOutcome addressed in this assessment:

IT390M1-1:Discuss intrusion detection and incident response principles and concepts.


The goals of a security program come from an analysis of risks and an assessment of the resources that you want to protect. In this assessment, you will explore essential concepts related to the development of this initiative.



Answer and provide a brief explanation (20–50 words) for each of the following five questions using a scholarly source cited in APA format per question.

  1. A ____________ is a network that uses a public network to provide access to a secured private network.

  2. True or False: A restrictive policy on a firewall denies all traffic by default, and only specifically allowed traffic is permitted into the network.

  3. ____________ is the ability to log and trace any performed action over a secured network, preventing a participant from denying it performed an action.

  4. Antivirus software and IDPSs are similar in that both make use of ____________ to identify threats.

    1. cookies

    2. signatures

    3. security patches

  5. Which access control method relies on access being defined in advance by system administrators?

    1. role-based access control (RBAC)

    2. discretionary access control (DAC)

    3. mandatory access control (MAC)

Part2:TheGoals of a Network Security Program

Answer and provide a 200- to 300-word explanation for each of the following two questions using a scholarly source cited in APA format per question.

  1. There are five goals of a network security program. Describe each.

  2. There are six motivations behind cyber-attacks. Summarize the six motivations that compel individuals and groups to attack a network.


Consider the following and respond in 200–300 words using a scholarly source cited in APA format per question:

  1. There are 11 attack attributes. Describe each attack attribute and categorize the level of threat each attack poses.

  2. What is meant by target value? Describe two target values.


Answers contain sufficient information and supporting references to adequately answer the questions and contain no spelling, grammar, or APA errors. For more information on APA style formatting, go to Academic Writer under Academic Tools of this course.

  • his assessment should be a Microsoft Word document, in addition to the title and reference pages.

  • Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your submission should be highly organized, logical, and focused.

  • Your submission should provide a clearly established and sustained viewpoint and purpose.

  • Your writing should be well ordered, logical, and unified, as well as original and insightful.

  • Your submission must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics.

  • A separate page at the end of your submission should contain a list of references in APA format. Use your textbook, the Library, and the internet for research.

  • Be sure to include references for all sources and to cite them using in-text citations where appropriate. Your sources and content should follow current APA citation style. Review the writing resources for APA formatting and citation found in Academic Tools. Additional writing resources can be found within the Academic Success Center.

  • Your submission should:

    • include a title page.

    • be double-spaced.

    • be typed in Times New Roman, 12 -point font; and

    • be free of spelling or punctuation errors.

Answered 4 days AfterJan 29, 2023

Answer To: Module 1 Assessment: Goals of a Network Security ProgramModule Outcomes addressed in this...

Shubham answered on Feb 02 2023
10 Votes
Part 1: Network Security Fundamentals
Question 1
Virtual Private Network
It is a technology that allows a user to securely access the internet and other networks from a remote locatio
n, as if they were directly connected to the network.
Question 2
True, a restrictive firewall policy, also known as a "default-deny" policy, denies all incoming and outgoing network traffic by default.
Question 3
Auditability is the ability to keep track of and record all actions and events that occur within a system or network (Sarker et al. 2020). This allows for the reviewing and auditing of past activity, enabling organizations to identify and investigate any potential security breaches or issues.
Question 4
Signatures refer to a specific pattern of code or data that is used to identify known malware. Antivirus software uses these signatures to scan for and detect known viruses, Trojans, worms, and other types of malicious software.
Question 5
Discretionary Access Control (DAC)
Discretionary Access Control (DAC) is a type of access control method in which access to resources is determined by the owner of the resource.
Part 2: The Goals of a Network Security Program
Question 1
Confidentiality: Protecting sensitive information from unauthorized access and ensuring that it is only accessible to authorized individuals.
Integrity: Ensuring that data and information transmitted over a network is not altered, tampered with, or corrupted during transit.
Availability: Ensuring that network resources and services are available to authorized users when needed. This helps to prevent network outages and disruptions, which can affect productivity and cause frustration for users.
Authentication: Verifying the identity of users before allowing them to access network resources. This helps to prevent unauthorized access to...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here