Limitations of CISCO SAFE Reference Architecture
Student Name
Institution Affiliation
Over the last years, there has been a tremendous change in the network infrastructure. Most of the organizations have adopted one of such kinds of innovation referred as CISCO SAFE reference architecture (Gai, Salli, and Andersson, 2010). Presently, this architecture is regarded as one of the best security architecture in the market due to its capacity to hold several network elements. Nevertheless, from security standpoint, as these technologies continue to evolve, several new and complex challenges continue to emerge. This security approach is limited in its ability to effectively secure and support most of the business transformations thus leaving most of these resources unprotected and preventing the deployment of the new services. Therefore, this paper will take the opportunity to analyze critically the various limitations of the approach and provide the reasonable recommendations on how to use the application. Despite its improved security protocol, this network is prone to the Intranet data center attacks. It has been noted with a great concern that the attack vectors have moved quite higher in their attack system to aim directly on the important elements of the Intranet data center. These vectors comprise of unauthorized access to the infrastructure that may lead to interruption or loss of the data. These vectors majorly attack the HTTP, SQL and XML of the architecture thus rendering the entire infrastructure useless (Gai, Salli, and Andersson, 2010). Second, it has been noted that the campus of the architecture may sometimes be threatened. This always occurs through data disruption and modification, data leak and network abuse. Such limitation often affects the overall operation of the architecture. DocWiki (2014) in his work, noted that a majority of the organization have also failed to use the architecture to secure common threats that may affect security. Instead, they have continued to aim at high-profile threats. For instance, they often forget the need of switching off unused ports to prevent any form of insider abuse and misuse. They fail to adhere to their role as important partners in risk management on the firm. This approach continues to expose them to a number of security threats that attacks the CISCO SAFE. On the other hand, Headquarters (2009) discovered that internet edge of the CISCO-SAFE is usually exposed to a large array of external threats. These threats include, network intrusion, web based phishing, viruses and other spyware. Further, the application attacks such as cross scripting and other unauthorized network intrusion are quite common in this architecture. Finally, most of these organizations lack the essential foundation of intelligent security policy that is necessary for protecting the firm. In most cases, these firms either completely lack reasonable security policies or ignore them hence exposing their vulnerability to a number of threats (Kim and Na, 2016).
The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.
Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.
No worries! You can instantly pick a different document that better fits what you're looking for.
No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.
“Bought, downloaded, and aced it. It really can be that simple.”