In Module Five, you were introduced to the Routing Information Protocol (RIP). You used RIP to allow networks to communicate through a router. RIP is one of the interior routing protocols that can be used to open communications between networks, or it can be used to stop communication between devices that reside on the same or different networks. As with any routing protocol, RIP has benefits and drawbacks. As a security practitioner, you will be called upon to provide your unique viewpoint and expertise in weighing the factors related to connectivity, traffic flow, and security when selecting or implementing routing protocols. Questions: For your initial post, address the following: How does employing an adversarial mindset affect decisions to implement RIP in the network? Construct your answer using one of the six fundamental design principles identified below:Separation of domainsIsolationModularityLayeringLeast privilegeMinimization of implementation Identify at least one vulnerability that RIP introduces related to the fundamental design principle that you chose. For reference, refer to the CIA Triad and Fundamental Security Design Principles PDF document. |