Given the network security applications and counter measures listed below:
- Ethical hacker
- Intrusion detection system/intrusion prevention system (IDS/IPS)
- Automatic updates
- Cryptography
- Data backups/archives
- Logon rights/access rights management
- Firewalls/proxies/sandboxes/DMZs
- Antivirus/malware scanners
Provide an well researched and well-documented response to the following questions:
- Where does each listed countermeasure belong within the seven domains of a typical IT infrastructure? Hint: It may be helpful to create a matrix listing the seven IT infrastructure domains and then plugging in the corresponding countermeasure.
- What CIA functions does each countermeasure provide? Hint: See Hint #1 above
Please be sure to provide your response via the proper thread under the discussion question link for this chapter. Please do not submit your reply via email, use only the thread provided by Canvas to submit your responses.