100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

CYB 220 Project Three Margomi Carrasco with Complete Solutions

Rating
-
Sold
-
Pages
5
Uploaded on
04-08-2025
Written in
2025/2026

CYB 220 Project Three Margomi Carrasco with Complete Solutions










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 4, 2025
Number of pages
5
Written in
2025/2026
Type
Other
Person
Unknown

Subjects

Content preview

CYB 220 Project Three Margomi Carrasco




PROJECT THREE: EVALUATION
OF NETWORK PROTECTION
TECHNOLOGIES




Margomi Carrasco
SNHU CYB-220-T4117




CYB 220 Project Three Margomi Carrasco

, CYB 220 Project Three Margomi Carrasco




Employing a fundamental security design is an essential part of a system since it remains

"considered while designing any security mechanism for a procedure. These principles are

reviewed to develop a secure system that prevents security flaws and prevents unwanted access

to the system." (T, 2020) A defense with depth in the fundamental security design principle

would implement prevention and intrusion detection. "Defense in depth is classified as laying

resource access authorization verification in a system or network to reduce the chance of a

successful attack." (Merritt, 2013) However, employing several security actions throughout the

network couple cripple whichever assailant is attempting to penetrate any section of the host,

which would minimize the risk of a network outage and disturbance/slowdown, while defensive

the confidentiality, integrity, and availability of the data stored on the network and its hosts.



To keep the network, secure the recommendation would be to deploy various NIPS, NIDS, and

IDS throughout the network. Every part of the location should have a NIPS appliance installed

on it, which would be installed on the "DMZ with a firewall on the inbound and outbound side."

(Fortinet, n.d.). As the "DMZ has a perimeter network that protects an organization's internal

local area network from untrusted traffic, DMZ provides a buffer between the Internet and the

private network. It would isolate by a security gateway, such as a firewall, that filters traffic

between the DMZ and a LAN." (Fortinet, n.d.) Using it would potentially reduce all usefulness

of HIDS; nevertheless, retaining those layers inside the network would improve the

organization's network protection. NIPS are efficient in "detecting, removing, detaining, and

redirecting malicious inbound network & subnet traffic. While HIDS's help assess malicious

packets before they are permitted to enter into a computer." (Dubrawsky, 2009) Besides, another

layer of protection that would be helpful include are IPS/IDS. IPS would be "controlling the


Page 1|5



CYB 220 Project Three Margomi Carrasco

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Boffin Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1762
Member since
4 year
Number of followers
1469
Documents
7146
Last sold
16 hours ago
Pilot Study

Prevent resits and get higher grades.

3.8

433 reviews

5
209
4
74
3
70
2
16
1
64

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions