Question: Part II - Answer all six questions [6 x 5 = 30 Marks] You have been assigned to address the network Security aspects of the

 Part II - Answer all six questions [6 x 5 =

Part II - Answer all six questions [6 x 5 = 30 Marks] You have been assigned to address the network Security aspects of the ABC Company against external attacks. In your response, address the followings. 1. Select and explain which computingetwork devices/services should be placed in DMZ: including router, firewall, mail relay, database server, web server, or authentication server. 2. Discuss the use of data encryption, digital signatures and two-factor authentication with case examples. 3. Recommend a relevant security protocol to ensure the confidentiality of transmissions in a business to customer (B2C) financial web application. 4. Most users employ a client-side digital signature to authenticate on a web server through SSL, but confidentiality can still be vulnerable. Identify the possible type of attack against the SSL and discuss its operations. 5. Which one of the following can be used to protect a network against unauthorised external connections: network encryption protocol, strong authentication, or an access control list of trusted devices? Justify your answer. 6. You want to improve the company security against external attacks in the Sydney branch, you are hesitant to choose among the use of static IP addressing, NAT, securing and analysing the system access logs. Choose the most appropriate option and rationalize your answer. Part II - Answer all six questions [6 x 5 = 30 Marks] You have been assigned to address the network Security aspects of the ABC Company against external attacks. In your response, address the followings. 1. Select and explain which computingetwork devices/services should be placed in DMZ: including router, firewall, mail relay, database server, web server, or authentication server. 2. Discuss the use of data encryption, digital signatures and two-factor authentication with case examples. 3. Recommend a relevant security protocol to ensure the confidentiality of transmissions in a business to customer (B2C) financial web application. 4. Most users employ a client-side digital signature to authenticate on a web server through SSL, but confidentiality can still be vulnerable. Identify the possible type of attack against the SSL and discuss its operations. 5. Which one of the following can be used to protect a network against unauthorised external connections: network encryption protocol, strong authentication, or an access control list of trusted devices? Justify your answer. 6. You want to improve the company security against external attacks in the Sydney branch, you are hesitant to choose among the use of static IP addressing, NAT, securing and analysing the system access logs. Choose the most appropriate option and rationalize your

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!