Cyber security Planning & Management

1) Write an essay of at least 500 words analyzing / What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one. It is important that you use your own words, that you cite your sources, Cite 2 of your sources in a clickable reference list at the end. Complete answers on a WORD Document please and ensure that you are following APA Format guidelines, using in-text citations and references.

Course: Network Security

1) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.What similarities do they share?It is important that you use your own words, that you cite your sources, Cite 2 of your sources in a clickable reference list at the end. Complete answers on a WORD Document please and ensure that you are following APA Format guidelines, using in-text citations and references.

2)

12.1 List three design goals for a firewall.

12.2 List four techniques used by firewalls to control access and enforce a security policy.

12.3 What information is used by a typical packet filtering firewall?

12.4 What are some weaknesses of a packet filtering firewall?

12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?

12.6 What is an application-level gateway?

12.7 What is a circuit-level gateway?

12.9 What are the common characteristics of a bastion host?

12.10 Why is it useful to have host-based firewalls?

12.11 What is a DMZ network and what types of systems would you expect to find on such networks?

12.12 What is the difference between an internal and an external firewall?

Sample Solution

id, however, provide reasons for this such as international and non-international armed conflict being motivators of destabilising the state, thus national security takes priority. Vreeland, Hill and Cole studies also found that those who signed CAT were more likely to practice torture such as China in regard to minority groups such as the Uighurs. This again suggests that legal mechanisms do not necessarily promote human rights, and political science is able to observe greater on what kind of states are likely to conform. However, criticisms arise as political science fails to look at the cultural relativist approach to explain why some states may undermine human rights instruments – however even so it does not justify states that grossly violate human rights. Conversely, Simmons found differences in states that are neither repressive nor completely democratic and was able to see a difference in states that did ratify CAT. However, establishing types of regimes is necessary when observing state behaviour of human rights as some states may not be able to progress as they have always been compliant to human rights, whereas other states the complete opposite. Political science then provides evidence that helps establish which states are likely to comply with human rights and which states are not. Furthermore, Risse, Ropp and Sikkink’s five-stages ‘spiral model’ addresses the processes whereby countries transition from a denial of human rights abuses to gradual compliance. The use of transnational actors such as NGOs has often helped states move from repressive regimes to compliant human rights advocates e.g. Tunisia. The spiral model was able to provide for a useful framework in how states are able to progress from non-compliant to cooperative. However, Jetschke and Liese and Landman argue that the spiral model overestimates CSOs and fails to consider how some powe

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.