the LAN-to-WAN domain . Specifically , the CIO is concerned with the following areas :
Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy ( AUP ) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain . The CIO anticipates receiving both a written report and diagram ( s ) to support your recommendations .
Write a three to five ( 3-5 ) page paper in which you :
Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will : Identify the fundamentals of public key infrastructure ( PKI ).
filter undesirable network traffic from the Internet