0% found this document useful (0 votes)
48 views1 page

Information and Network Security: Assignment 1

This document outlines 10 questions about information and network security policies, incident response planning, firewalls, and virtual private networks (VPNs). It asks the reader to define security policies and explain issue-specific and system-specific policies. It also asks about who is responsible for policy management and how policies are managed. Additional questions cover the workings of screened host and dual homed firewalls, firewall configuration and management, firewall categories based on processing mode, the two modes of a VPN, major steps in the BS7799:2 security planning document, and techniques for implementing a VPN.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views1 page

Information and Network Security: Assignment 1

This document outlines 10 questions about information and network security policies, incident response planning, firewalls, and virtual private networks (VPNs). It asks the reader to define security policies and explain issue-specific and system-specific policies. It also asks about who is responsible for policy management and how policies are managed. Additional questions cover the workings of screened host and dual homed firewalls, firewall configuration and management, firewall categories based on processing mode, the two modes of a VPN, major steps in the BS7799:2 security planning document, and techniques for implementing a VPN.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Information and Network Security

Assignment 1
1) Define policy and explain issue specific security policy. 2) Explain the importance of incident response planning strategy. 3) Discuss the system specific security policy. How managerial guidance and technical specifications can be used in SyspSP? 4) Who is responsible for a policy management? How a policy is managed? Explain. 5) What is a firewall? Show the working of a screened host and dual homed firewalls. 6) How a firewall can be configured and managed. Give examples. 7) Explain the categories of firewalls based on processing mode. 8) What is a VPN? Explain the two modes of a VPN. 9) Explain the major steps specified in BS7799:2 document. How it helps in security planning. 10) Explain different techniques to implement a VPN.

You might also like