Fundamental design principle that you chose

Assignment Help Computer Engineering
Reference no: EM133628017

Question: RIP works by broadcasting its routing table every 30 seconds. It will do the same with all of the other routers until all routers have the same routing paths. If it finds a shorter path upon broadcasting it will change its route to a shorter path. If a router goes down it will switch paths. For this discussion I chose least privilege. Least privlege is all about ensuring that only the people who need access to a resource have the ability to access it. If someone who is not supposed to have access to the RIP gains access they can manipulate network traffic and compromise your network. They could also give themselves more privleges or aquire sensitive information.

What more could I add to my discussion post?

How does employing an adversarial mindset affect decisions to implement RIP in the network? Construct your answer using one of the six fundamental design principles identified below:
Separation of domains
Isolation
Modularity
Layering
Least privilege
Minimization of implementation

Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad and Fundamental Security Design Principles PDF document.

Reference no: EM133628017

Questions Cloud

Article-harnessing the power of narrative-literacy : Critical review of the article that you have searched ("Harnessing the Power of Narrative: Literacy and Orality in Christian Education").
What might you do to prevent this from happening in future : Project pitfalls are not as rare as folks may think. What might you do to prevent this from happening in the future?
How effective the green and lean supply chain processes : How effective the green and lean supply chain processes such as product design, material sourcing and selection, manufacturing and production and operation.
Describe the risk and explain your ranking : Describe the risk and explain your ranking. Identify at least two risks (not just financial) that should be centralized and explain the advantages of the centra
Fundamental design principle that you chose : Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad
Does information technology training really matter : Does Information Technology Training Really Matter? A Social Information Processing Analysis of Coworkers' Influence on IT Usage in the Workplace.
How would social media risks be addressed by hipaa : How would social media risks be addressed by HIPAA? What role do audit trails play in monitoring for unauthorized information access? Describe two methods you
What term used for very short-term warehousing arrangements : What is the term used for very short-term warehousing arrangements that allow clients to use as much or little space as they would like for periods of days?
Which is best describe the structure at happy foods : Happy Foods, a food manufacturing company, is organized in four divisions according to the three different. Which is best describe the structure at Happy Foods?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd