For your final step, synthesize the previous steps and labs to summarize the major findings and from this project.

Specifically, prepare a technical report that summarizes your findings. Include all of the following elements:

1. The strengths and limitations associated with limiting access of web pages through the use of firewalls.

2. A detailed description of how tunneling through firewall via SSH worked and how the process could be used protect a private subnet. Describe the implications of using a jump box for access to the private subnet. Cover concerns such as key storage, creation, and rotation at scale for a large organization.

3. TLS communication challenges and results from your TLS 1.3 Java client-server implementation. Describe how this functionality could be used to support an IoT application with hundreds of thousands of remote sensor devices connecting across a distributed network.

4. A discussion of major threats to WLANs and how each can be mitigated. Provide security monitoring best practices and describe suitable approaches to protecting a WLAN.

Delve further into these topics by conducting research beyond the classroom readings and lab exercises to gain further insight and enhance your report.

Naturally, I expect your report will include a title page, table of contents, list of tables and figures (if applicable), and a list of references. Organize the content into sections, with clear, meaningful headings.

References

Joint Task Force Transformation Initiative. (2015, January 22). “SC-7 Boundary Protection,” from Security and Privacy Controls for Federal Information Systems and

To summarize the primary discoveries and findings from this research, synthesize the previous steps and labs in the final step.

Prepare a technical report that summarizes your findings in detail. Include all of the items listed below:

1. The strengths and limitations associated with limiting access of online pages through the usage of firewalls.

2. A full explanation of how to tunnel around a firewall using SSH and how to use the procedure to defend a private subnet. Explain the consequences of utilizing a jump box to gain access to a private subnet. For a large company, address issues like key storage, creation, and rotation at scale.

3. TLS communication challenges and results from your TLS 1.3 Java client-server implementation. Describe how this functionality could be used to support

Published by
Essays
View all posts