Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:
Where does the application or countermeasure belong in the seven domains of a typical IT infrastructure? An application or countermeasure may span two or more domains.
What confidentiality, integrity, and availability (CIA) function(s) does the countermeasure provide?
Provide your answers in the table below.
Network Security Applications and Domain(s) CIA Function(s) Countermeasures Intrusion detection system/intrusion prevention system (IDS/IPS) Cryptography Logon rights Firewall WPA Antivirus scanner Virtual private networlk MAC address filtering
Network Security Applications and Domain(s) CIA Function(s) Countermeasures Intrusion detection system/intrusion prevention system (IDS/IPS) Cryptography Logon rights Firewall WPA Antivirus scanner Virtual private networlk MAC address filtering