Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
2 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Security Technical Implementation Guide and Virtual LANs

Coursework Instructions:

One of the best guidelines to follow for cybersecurity controls is handed down from the Department of Defense. These are called STIGs. What are they and can you find any vulnerabilities in these STIGs that pertain to VLANs? (Hint: look for the STIGs for layer 2 switches). If you are looking to get into cybersecurity, you should become familiar with the STIGs.

Coursework Sample Content Preview:

270- 1 Posts PARTICIPATION CREDIT: VLANS and STIGS
Student’s Name
Institutional Affiliation
Course
Instructor
Date
270- 1 Posts PARTICIPATION CREDIT: VLANS and STIGS
A Security Technical Implementation Guide (STIG) is a configuration standard that comprises the cyber security features of a particular product. Businesses, governmental, and non-governmental organizations use these programs to enhance the security of the protocols within their networkers, servers, and digital systems and ensure that they are foul-proof. The programs are published by the Defense Information Systems Agency (DISA), and any organization has to adhere to them while connecting to the US Department of Defense (DoD) networks (Titania, n.d.). DISA ensures that all computer systems and networks related to the DoD are secure. These STIGs are published quarterly and are designed to ensure that all organizations are compliant with the security requirements.
There is a potential for vulnerabilities in the STIGs about VLANs. Network securities remain to be a significant concern for DoD customers. These securities are safeguarded by the Network Infrastructure STIG, which monitors the security considerations at the network level necessary to determine an acceptable amount of risk that is tolerable for the information to be transmitted along the enclave. This STIG is designed to boost confidentiality, integrity, and the presence of sensitive DoD Automated Information Systems (AIS). A significant requirement is that each network infrastructure provides secure and reliable data for all its customers.
A VLAN, which means (virtual LAN), is a subnetwork that can classify different devices on separate physical local area networks (LAN). A LAN refers to a group of computers and machines operating on a shared network through the same communications l...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!