Question: Part II - Answer all six questions [6 x 5 = 30 Marks] You have been assigned to address the network Security aspects of the

Part II - Answer all six questions [6 x 5 = 30 Marks] You have been assigned to address the network Security aspects of the ABC Company against external attacks. In your response, address the followings. 1. Select and explain which computingetwork devices/services should be placed in DMZ: including router, firewall, mail relay, database server, web server, or authentication server. 2. Discuss the use of data encryption, digital signatures and two-factor authentication with case examples. 3. Recommend a relevant security protocol to ensure the confidentiality of transmissions in a business to customer (B2C) financial web application. 4. Most users employ a client-side digital signature to authenticate on a web server through SSL, but confidentiality can still be vulnerable. Identify the possible type of attack against the SSL and discuss its operations. 5. Which one of the following can be used to protect a network against unauthorised external connections: network encryption protocol, strong authentication, or an access control list of trusted devices? Justify your answer. 6. You want to improve the company security against external attacks in the Sydney branch, you are hesitant to choose among the use of static IP addressing, NAT, securing and analysing the system access logs. Choose the most appropriate option and rationalize your answer. Part II - Answer all six questions [6 x 5 = 30 Marks] You have been assigned to address the network Security aspects of the ABC Company against external attacks. In your response, address the followings. 1. Select and explain which computingetwork devices/services should be placed in DMZ: including router, firewall, mail relay, database server, web server, or authentication server. 2. Discuss the use of data encryption, digital signatures and two-factor authentication with case examples. 3. Recommend a relevant security protocol to ensure the confidentiality of transmissions in a business to customer (B2C) financial web application. 4. Most users employ a client-side digital signature to authenticate on a web server through SSL, but confidentiality can still be vulnerable. Identify the possible type of attack against the SSL and discuss its operations. 5. Which one of the following can be used to protect a network against unauthorised external connections: network encryption protocol, strong authentication, or an access control list of trusted devices? Justify your answer. 6. You want to improve the company security against external attacks in the Sydney branch, you are hesitant to choose among the use of static IP addressing, NAT, securing and analysing the system access logs. Choose the most appropriate option and rationalize your
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
