113k views
1 vote
In Lauren's initial design for a secure network, she applied the same security controls to every system and network. After reviewing her design, she decided to isolate systems based on their functions and to apply controls to protected network segments for more sensitive data and systems. What two design models did she apply?

A. Threat analysis-based design, protected enclaves
B. Uniform protection, threat analysis-based design
C. Information-based design, uniform protection
D. Uniform protection, protected enclaves

User Janoz
by
6.9k points

1 Answer

1 vote

Final answer:

Lauren initially applied a uniform protection model across all systems, providing the same security without differentiation. She then revised her approach to create protected enclaves, applying specific controls to segments with sensitive data, reflecting the models of Uniform protection and Protected enclaves.

Step-by-step explanation:

In Lauren's initial design for a secure network, she applied uniform protection to every system and network, meaning the same level of security was implemented across all systems without taking into account their individual functions or sensitivities. Upon reviewing her design, Lauren decided to implement a more nuanced approach. She chose to isolate systems based on their functions, creating protected enclaves, which are dedicated segments of the network with specific, enhanced security controls for more sensitive data and systems.

This approach recognizes that not all network assets have the same level of sensitivity or require the same level of protection, and therefore, varying levels of security are applied appropriately. Hence, the two design models she applied were D. Uniform protection, protected enclaves.

User Kougami
by
8.0k points