Guide to Firewalls and VPNs Chapter 3 first two Case Exercises
Total Pages: 2
Download All the Answers By Clicking Add To Cart.
$3.00Add to cart
Chapter 3 Case Exercises
1. Create a network diagram for Data Mart’s current network configuration. Then create a second diagram incorporating the proposed firewall architectures.
2. Create a table for each asset listed, including the firewall. In this table, list the users who need access as well as their corresponding level of access based on the simple three- layered scheme discussed by Rachel and Alex (user, power user, and administrator). Then explain which privileges are needed for the roles of user, power user, and administrator with regard to each device, dataset, or service.
Following is the desired table in the light of the description in the text book (Whitman & Michael, 2012).
Assets | Users and Access Level |
Staff and Customer’s Personal Data | Owner (Administrator), VP,s (Administrative) |
Financial information | Owner (Administrator), VP,s (Administrative), Managers (power user) |
Data Files by Clients | Managers (power user), Clients (User) |
Storage Data | Managers (power user), Clients (User) |
Analysis Data | Managers (power user), Clients (User) |
System Application Software | Managers (power user) |
Firewall | Managers (power user) |
References
Whitman, Michael. (2012) Guide to Firewalls and Network Security. 3rd edition, Course Technology,Cengage Learning. ISBN: 9781111135393.
Download All the Answers By Clicking Add To Cart.
$3.00Add to cart
OR