Routing Protocol Vulnerabilities
In Module Five, you were introduced to the Routing Information Protocol (RIP). You used RIP to allow networks to communicate through a router.
RIP is one of the interior routing protocols that can be used to open communications between networks, or it can be used to stop communication between devices that reside on the same or different networks. As with any routing protocol, RIP has benefits and drawbacks. As a security practitioner, you will be called upon to provide your unique viewpoint and expertise in weighing the factors related to connectivity, traffic flow, and security when selecting or implementing routing protocols.
For your initial post, address the following:
How does employing an adversarial mindset affect decisions to implement RIP in the network? Construct your answer using one of the six fundamental design principles identified below:
Separation of domains
Isolation
Modularity
Layering
Least privilege
Minimization of implementation
Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad and Fundamental Security Design Principles document.
In your responses to your peers, address the following:
If you were charged with designing a new network and introducing Open Shortest Path First (OSPF) instead of RIP, how would adopting OSPF affect the fundamental design principle your peer identified in their initial post? Consider addressing the effects on both security and network traffic in your reply.
To complete this assignment, review the Discussion Rubric document.
👀 Other Visitors are Viewing These APA Essay Samples:
-
MilleniAds: Maintenance and Security
3 pages/≈825 words | 3 Sources | APA | IT & Computer Science | Essay |
-
7-1 Discussion: Advantages and Drawbacks of VPNs
1 page/≈275 words | No Sources | APA | IT & Computer Science | Essay |
-
Damage To An Organization Or Government
1 page/≈275 words | 4 Sources | APA | IT & Computer Science | Essay |