Fundamental design principle that you chose

Assignment Help Computer Engineering
Reference no: EM133628017

Question: RIP works by broadcasting its routing table every 30 seconds. It will do the same with all of the other routers until all routers have the same routing paths. If it finds a shorter path upon broadcasting it will change its route to a shorter path. If a router goes down it will switch paths. For this discussion I chose least privilege. Least privlege is all about ensuring that only the people who need access to a resource have the ability to access it. If someone who is not supposed to have access to the RIP gains access they can manipulate network traffic and compromise your network. They could also give themselves more privleges or aquire sensitive information.

What more could I add to my discussion post?

How does employing an adversarial mindset affect decisions to implement RIP in the network? Construct your answer using one of the six fundamental design principles identified below:
Separation of domains
Isolation
Modularity
Layering
Least privilege
Minimization of implementation

Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad and Fundamental Security Design Principles PDF document.

Reference no: EM133628017

Questions Cloud

Article-harnessing the power of narrative-literacy : Critical review of the article that you have searched ("Harnessing the Power of Narrative: Literacy and Orality in Christian Education").
What might you do to prevent this from happening in future : Project pitfalls are not as rare as folks may think. What might you do to prevent this from happening in the future?
How effective the green and lean supply chain processes : How effective the green and lean supply chain processes such as product design, material sourcing and selection, manufacturing and production and operation.
Describe the risk and explain your ranking : Describe the risk and explain your ranking. Identify at least two risks (not just financial) that should be centralized and explain the advantages of the centra
Fundamental design principle that you chose : Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad
Does information technology training really matter : Does Information Technology Training Really Matter? A Social Information Processing Analysis of Coworkers' Influence on IT Usage in the Workplace.
How would social media risks be addressed by hipaa : How would social media risks be addressed by HIPAA? What role do audit trails play in monitoring for unauthorized information access? Describe two methods you
What term used for very short-term warehousing arrangements : What is the term used for very short-term warehousing arrangements that allow clients to use as much or little space as they would like for periods of days?
Which is best describe the structure at happy foods : Happy Foods, a food manufacturing company, is organized in four divisions according to the three different. Which is best describe the structure at Happy Foods?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the benefits of iot, system integration

what are the benefits of IoT, System Integration, Block chain with regards to letter of acceptance and confirmation of the enrollment?

  How you would configure the virtual disks for the vms

Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

  What are the contributions and limitations of the paper

Describe the research problem of this paper. Is the research important? Why? What is (are) the major finding(s)? are these findings impo

  What types of virtualization

CSSS 5110 Webster University What types of virtualization (platform, workstation, server, network, storage, application) does type 2 hypervisor support?

  Cybersecurity implications with artificial intelligence

Case Study - Cybersecurity Implications with Artificial Intelligence and What is the current state of regulation and standardization in the use of AI

  Write a program to generate random connected graphs

Write a program to generate random connected graphs with V vertices, then find the minimum spanning tree and shortest path tree for some vertex.

  How the items mentioned previously could be used together

Write the code for manipulating abstract syntax trees if cfront had been written in C++. Why do you suppose Stroustrup chose to write it in C instead?

  Design and implement a driver class called fliprace

Design and implement a driver class called FlipRace whose main method creates two Coin objects.

  Write a function called circular prime that finds the number

Write a function called circular_primes that finds the number of circular prime numbers smaller than n, where n is a positive integer scalar input argument.

  Find out what are the data structures you need to use

Come up with the sequence how you would call functions from the main function, inside the game loop, and from inside other functions.

  What new equipment and software are necessary

The CIO asked you to read Too Much of a Good Thing to think about what resources you will need to get your new information system up and running.

  How trade between the two countries benefits

Distinguish "absolute advantage" from "comparative advantage" in the context of your example. Then select an international terms-or-trade ratio and explain in.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd