Cia responses | Information Systems homework help

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

The abbreviation CIA (meaning confidentiality, integrity, and availability) is a pretty clear description of a what a firewall should provide to a network. The practices that will help achieve a better state of CIA will ultimately lie in how yo configure your firewall. When configure your firewall its a good idea to initially block all traffic by default and then begin authorizing traffic from trusted sources as needed. This lowers the chance of accidently forgetting to block traffic from a specific network. Another good practice to have with firewalls is to update their configurations regularly. This allows you to make changes to the configurations as needed as well as make sure that no unauthorized changes have been made. 

As for the daily logging required by the CISO, I think the firewalls offered by WatchGuard would be the best choice. They not only allow live monitoring of network traffic but they also include in depth logging that can be organized and viewed on multiple levels as to make the information easier to understand. It is a next gen firewall that includes the benefits of the packet filtering, circuit level gateway, and stateful inspection firewall. Like most next gen firewalls it also includes an IPS along with, furthering the security measures.

Managing a firewall of this caliber can be a daunting task, as it is more geared towards those who are more tech savvy. Updates are pushed by the manufacturer but may still require action from the user to install them. As i mentioned earlier, regularly checking and changing the configurations are going to be a core part of managing this firewall.

-MAURICE

RESPONSE 2:

The CIA Triad stands for Confidentiality, Integrity and Availability. It is a bit like a three-legged stool. If one part of the triad is lacking, the rest of it comes tumbling down. Firewall best practices must ensure all three remain standing. This includes protecting sensitive data, keeping the system and all devices running, and blocking threats so that no compromises can enter the system (Gault, 2015). For instance, if a firewall is not doing its job, and the system is infected by a denial-of-service attack or other network intrusion, that will prevent access by legitimate users, aka Availability. This also bleeds over to Integrity, because the system is not running as it should, and is compromised. Firewall rules must further adhere to the requirements of the organization, and block/allow traffic pending the “security” or Confidentiality, aka need-to- know of employees, etc.

To be successful with achieving the CIA triad, firewall rules must be paired with logging, which records details on IP addresses, ports, and overall network activity. Logs are beneficial in detecting nefarious activity and remedying any problem as quickly as possible. In this case, the best firewall to support detailed logging (and the most fiscally responsible) would be the built-in Microsoft Windows firewall (Exabeam, n.d.). With a few somewhat simple steps, a user can modify the properties so that it logs traffic and creates a “pfirewall.log” file in the directory. The logs records time and date of connections, if it was approved or denied, the type of connection, IP, and packet direction. Managing this software firewall type is simple, as it is updated as Microsoft software patches and updates are pushed. This solution is geared towards a small organization or home office but is still extremely useful in detecting suspicious activity.

References

Exabeam (n.d.). The Significance and Role of Firewall Logs. Exabeam. Retrieved 09 March 2021, from https://www.exabeam.com/siem-guide/siem-concepts/firewall-logs/

Gault, M. (20 December 2015). The CIA Secret to Cybersecurity That No One Seems To Get. Wired. Retrieved 09 March 2021, from https://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get/

-GRETCHEN

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency