How would you employ firewalls to mitigate insider threats


Cybersecurity

1) four potential types of harm: interception, modification, fabrication, and interruption. For each type, identify the countermeasure you believe to be the more effective. Explain your answers.

2) Provide the step-by-step process for how a virtual private network (VPN) is established.

3) Consider the definitions of link encryption and end-to-end encryption. Into which category would you place the virtual private network (VPN)? Explain your answer.

4) A classic approach used by attackers is to break an attack into multiple packets. The packets may be individually harmless. Why would this attack work? Explain your answer.

5) How would you employ firewalls to mitigate insider threats? Why would your approach work?

6) Can host-based and network-based intrusion detection systems be effectively combined? Explain your answer.

7) Consider onion routing. Assume the algorithm were restricted to a single intermediate node. Would it still be adequate? Explain your answer.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: How would you employ firewalls to mitigate insider threats
Reference No:- TGS02516908

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)