6.3 Module 6 Discussion (Chapters 20 and 21

6.3 Module 6 Discussion (Chapters 20 and 21

Hi again!

People icons representing discussion among peers.

In any discussion about network security — which includes protecting both the voice and data communications — there is always some mention of “ports.” By this, we do *not* mean deep-sea harbors (which are my favorite!), of course, but the “holes” made in the firewall so that some communication protocols can pass through.

It is not intended for you to get too deep technically on this topic, but it is an item of importance. Plus, there is uncertainty whether 100% of everyone fully understands what significance ports play in a networked environment. So, let’s discuss that… specifically, what do you do (or should you do) as it pertains to ports and securing an environment? When responding to this topic, it is important to consider the context of ports, services, and protocols. If you are involved in network security, explain your approach.

And related to this, what is the best rule — shut everything off, then allow the services you need *or* turn everything on and shut off the bad stuff?

By the way, if you do need a quick link that identifies some of the ports and services, check out: http://www.comptechdoc.org/independent/networking/guide/netports.html (Links to an external site.)Links to an external site..

Have fun!

Discuss and interact regularly with your classmates, bringing the discussion to a close by the end of Week 7.

Refer to the rubric for grading criteria.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper