Sign In
Not register? Register Now!
Essay Available:
1 page/≈275 words
No Sources
IT & Computer Science
English (U.S.)
MS Word
Total cost:
$ 5.4

Routing Protocol Vulnerabilities (Essay Sample)


In Module Five, you were introduced to the Routing Information Protocol (RIP). You used RIP to allow networks to communicate through a router.
RIP is one of the interior routing protocols that can be used to open communications between networks, or it can be used to stop communication between devices that reside on the same or different networks. As with any routing protocol, RIP has benefits and drawbacks. As a security practitioner, you will be called upon to provide your unique viewpoint and expertise in weighing the factors related to connectivity, traffic flow, and security when selecting or implementing routing protocols.
For your initial post, address the following:
How does employing an adversarial mindset affect decisions to implement RIP in the network? Construct your answer using one of the six fundamental design principles identified below:
Separation of domains
Least privilege
Minimization of implementation
Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad and Fundamental Security Design Principles document.
In your responses to your peers, address the following:
If you were charged with designing a new network and introducing Open Shortest Path First (OSPF) instead of RIP, how would adopting OSPF affect the fundamental design principle your peer identified in their initial post? Consider addressing the effects on both security and network traffic in your reply.
To complete this assignment, review the Discussion Rubric document.


Routing Protocol Vulnerabilities
It is always wide spreading to compute for security weakness, this is because most of the computing products and the communication stages are developed to meet the performance and functionality requirements while it has no consideration of security. Vulnerabilities of the system are further increased in case of migration to interconnected and highly pervasive computers from traditional computers. one of the trending themes which riding the current security risks, threats and breaches is the ineffective attention that is paid to the secure design principles. There is no doubt that to have an application or software that strong in fighting against an attack it must be utilizing a secure des

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Networking Options. Examine the business’s issues to determine network requirements
    Description: asic knowledge of computers is practically essential for productively engaging in twenty-first-century life. Working knowledge of computer platform technologies impacts everyone from help desk personnel and field technicians to project managers and business executives....
    2 pages/≈550 words | 2 Sources | APA | IT & Computer Science | Essay |
  • Malware Analysis: Malicious Software
    Description: Malicious software is one of the sophisticated strategies that cybercriminals use to accomplish their set objectives, thus creating the need to conduct an analysis to determine the purpose and characteristic of an attack....
    8 pages/≈2200 words | 4 Sources | APA | IT & Computer Science | Essay |
  • Security Concerns & DNS Implementations
    Description: DNS contains the database of public IP addresses and the host names associated. It is described and observed to be one of the greatest accomplishment in the last three decades to have driven the World Wide Web....
    1 page/≈275 words | No Sources | APA | IT & Computer Science | Essay |
Need a Plagiarism Free Essay?
Submit your instructions!