Premium Essay

Firewall Solution

In: Computers and Technology

Submitted By houskadance
Words 1780
Pages 8
Chapter 1 Solutions File

Review Questions

1. What is the difference between a threat agent and a threat? A threat is an object, person, or other entity that poses a risk of loss to an asset—i.e., the organizational resource that is being protected. A threat agent is a specific instance of a general threat. 2. What is the difference between vulnerability and exposure? A vulnerability is a weakness or fault in the protection mechanisms that are intended to protect information and information assets from attack or damage. An exposure is a weakness that is revealed or exposed to the attack environment. 3. What is a hacker? What is a phreaker? A hacker is a person who uses information systems or data networks without permission or in ways that violate the owner’s intentions, usually by bypassing controls or ignoring policy. A phreaker is a hacker on the voice telecommunication network. 4. What are the three components of the C.I.A. triangle? What are they used for? The C.I.A. triangle, an industry standard for computer security since the development of the mainframe, is based on the three characteristics of information that make it valuable to organizations: confidentiality, integrity, and availability. Confidentiality is the protection of information from disclosure or exposure to unauthorized individuals or systems. This means that only those with the rights and privileges to access information are able to do so. Integrity is when information remains whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. Availability enables authorized users—persons or computer systems—to access information without interference or obstruction, and to receive it in the required format. 5. If the C.I.A. triangle no…...

Similar Documents

Premium Essay

Firewalls

...Firewall Taxonomy Firewalls come in various sizes and flavors. The most typical idea of a firewall is a dedicated system or appliance that sits in the network and segments an "internal" network from the "external" Internet. Most home or SOHO networks use an appliance-based device for broadband connectivity that includes a built-in firewall. Following is the description of three most important type of firewalls Personal Firewalls Personal firewalls are designed to protect a single host. They can be viewed as a hardened shell around the host system, whether it is a server, desktop, or laptop. Typically, personal firewalls assume that outbound traffic from the system is to be permitted and inbound traffic requires inspection. By default, personal firewalls include various profiles that accommodate the typical traffic a system might see. For example, Zone Alarm has low, medium, and high settings that allow almost all traffic, selected traffic, or nearly no traffic, respectively, through to the protected system. In a similar vein, IP Tables. which you can set up as a personal firewall as well as in a network firewall role during the setup of the Linux system, enables the installer to choose the level of protection for the system and the customization for ports that do not fall into a specific profile. One important consideration with personal firewalls is centralized management. Some vendors have identified that a significant barrier to deployment of personal......

Words: 1326 - Pages: 6

Free Essay

Firewalls

...DAYSTAR UNIVERSITY An assignment IN PARTIAL FULFILLMENT TO THE COURSE ACS 431 Presented by: Gladys Mumbua (10-1809) Submitted to MR FREDRICK OGOR FIREWALLS A firewall is a device that serves as a barrier between networks providing access control, traffic filtering and other security features. Firewalls are commonly deployed between trusted and untrusted networks, for example between the Internet (untrusted) and an organization’s trusted private various network. They [firewalls] can also be used internally to segment an organization’s network infrastructure, for example; deploying a firewall between the traffic was received to determining whether the corporate financial information and the rest of the company network. A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. Hardware based firewalls: Hardware firewalls are exactly what the name implies; hardware device that is placed somewhere in the traffic flow of an organization’s network. Once in place, the device receives and analyzes......

Words: 1098 - Pages: 5

Premium Essay

Firewalls

...Checkpoint: Firewalls IT/242 Your Name A firewall is one of the main software features that are in a computer system or a network. The job of a firewall is to prevent unauthorized access from the outside while authorizing access that is permitted. Firewalls are mainly used to keep outside intruders from accessing the private networks. There are several types of firewalls that are available for security. Firewall can be used for a home network, work network, and large business networks. The first level for a firewall is the packet filters. The packet filters can offer access and refuse access to any machines that are located within the network system and outside the network. It is also able to manage the direction of access the machine has. A firewall can control and allow incoming traffic as well as outgoing traffic. The second level is the application level gateway. The application level gateways are kept between the user that is on the Internet network and the service on the Internet. The next level of firewall is the circuit level gateway. The circuit level gateway functions on the transport level of the OSI model. The UDP and TCP are checked by the Circuit level gateways before attempting to make the connection. A proxy server is the last level of a firewall. This is used to intercept all of the messages that enter and leave the network system. The proxy server is able to conceal the true network addresses. When it comes down to choosing which firewall will best......

Words: 320 - Pages: 2

Free Essay

Firewalls

...Firewalls are essential security elements in any network. However, as with all aspects of network security, deploying firewalls is a complicated task. Many factors need to be considered, chief among them is cost and function. A dilemma faces all firewall administrators: what is the proper balance between firewall security and network usability. In other works, how can one make the network secure as possible with a firewall while maintaining ease of use and maintaining appropriate speed of the connections for the users? There is no one or easy answer to this question. Each network and organization is unique. I believe that fact is the key to a good answer. Since each organization has unique objectives and goals the firewall must protect those security elements that achieve those objectives and goals. To some extent, firewalls must be customized to meet the needs of the organization. I have read about the trade-offs of an out-of-the-box firewall versus a firewall that is built from scratch to meet the requirements of a particular network’s security. A do-it-yourself firewall has the advantage of being highly customized to the needs of the organization and an out-of-the-box firewall generally is more expensive. Does that make a do-it-yourself firewall the better choice? I think not. It seems to me that a pre-built firewall has one overriding advantage when compared to a do-it-yourself unit: documentation and support. What if the builder of that do-it-yourself......

Words: 534 - Pages: 3

Free Essay

Firewalls

...Firewalls Samuel Vallez May 2, 2014 IT/242 Joseph Guin A firewall is a tool that is really used to monitor the flow of traffic on a network to ensure that there is nothing that is harmful being transmitted. There are three kinds of firewalls that can be used which are network, application, and circuit. The network firewall basically works by inspecting packet headers and filtering traffic based on the IP address. It is a pretty fast way of doing things and is still in use today. The downfall is that it is unable to understand languages like HTML or XML and this leaves you open to lots of threats. Application firewalls dig a lot deeper into the application data that is going through the filter. It is a process that takes longer, but boasts features like logging of user activity and filtering sites based on content and not just by IP address. Circuit level is more based on making sure that a session is legitimate by monitoring TCP handshaking between packets. This does not filter individual packets and is bound to certain session rules. It is very helpful in protecting the network from outside intrusion. All three firewalls are useful in one way or another. I personally think that the application based firewall is the best out of all three. Most threats these days can be caught with this type of firewalling. While it is not full proof and takes some more time, I think that it is the most helpful to use....

Words: 255 - Pages: 2

Premium Essay

Firewall

...Barracuda NG Firewall Scalable Security for the Enterprise Enterprise networks grow larger and more complex every day - and more critical to key business operations. The Barracuda NG Firewall is an essential tool to optimize the performance, security, and availability of today's dispersed enterprise WANs. Security Storage Application Delivery The Barracuda Advantage Effective WAN Management • Application-based traffic prioritization across the WAN • Intelligent uplink balancing • Intelligent traffic re-prioritization on uplink loss Enterprise Readiness • Industry-leading centralized management • WAN optimization • Global WAN monitoring with Barracuda NG Earth Scalable Security • Cloud Enablement and secure WAN Virtualization • Drag-and-drop VPN graphical tunnel interface Product Spotlight • Powerful next-generation network firewall • Intelligent traffic regulation and profiling • Centralized management of all functionality • Deep application control • Comprehensive, built-in IDS/IPS • Tightly integrated QoS and link balancing • Template-based and role-based configuration • Built-in web security (model F100 and higher) Integrated Next-Generation Security The Barracuda NG Firewall is designed and built from the ground up to provide comprehensive, next-generation firewall capabilities. Cloud-hosted content filtering and reporting offload compute-intensive tasks to the cloud for greater resource efficiency and throughput. Based on application visibility,......

Words: 1351 - Pages: 6

Premium Essay

Web Application Firewalls

...Magic Quadrant for Web Application Firewalls Page 1 sur 13 Magic Quadrant for Web Application Firewalls 17 June 2014 ID:G00259365 Analyst(s): Jeremy D'Hoinne, Adam Hils, Greg Young, Joseph Feiman VIEW SUMMARY The WAF market is growing quickly from a small base; it is composed of pure players, application delivery controller vendors, cloud service providers and network security vendors. Buyers should evaluate how WAFs can provide high security, minimize false positives and sustain performance. STRATEGIC PLANNING ASSUMPTIONS At the end of 2018, less than 20% of enterprises will rely only on firewalls or intrusion prevention systems to protect their Web applications — down from 40% today. By year-end 2020, more than 50% of public Web applications protected by a WAF will use WAFs delivered as a cloud service or Internet-hosted virtual appliance — up from less than 10% today. Market Definition/Description The Web application firewall (WAF) market is defined by a customer's need to protect internal and public Web applications when they are deployed locally (on-premises) or remotely (hosted, "cloud" or "as a service"). WAFs are deployed in front of Web servers to protect Web applications against hackers' attacks, to monitor access to Web applications, and to collect access logs for compliance/auditing and analytics. WAFs are most often deployed in-line, as a reverse proxy, because historically it was the only way to perform some in-depth inspections. Other deployment......

Words: 10448 - Pages: 42

Free Essay

Firewall Software

...Software firewall: Firewall software has programs which are designed to monitor the data and also control the flow of traffic between the PC’s and the network. They are used to prevent unapproved access to PC’s or networks. The programs in firewall can allow, control access, encrypt, or substitute computer traffic based on settings. Advantages and disadvantages of software firewall: The advantage of firewall software is that it runs directly on the computer where it can also know about the network traffic along with what port it is using and where it is going. Firewall keeps in track about the programs that are trying to access internet and it identifies whether it is authorized or malicious. Depending on whether the access is authorized or not, it will allow sending and receiving data. If at all the firewall is not sure about the nature of the program then the user is urged to provide confirmation before the traffic is allowed to access (Pacchiano, 2011). The disadvantage of software firewall is that it only protects the machine where it is installed in. To protect multiple machine via firewalls you need to purchase multiple licensed copies and install and configure them individually in each system, which is expensive and difficult to manage (Pacchiano, 2011). Reference: Pacchiano, R. (June 09, 2011). Firewall Debate: Hardware vs. Software. Retrieved from......

Words: 491 - Pages: 2

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in......

Words: 3381 - Pages: 14

Premium Essay

Assignment 2 Types of Firewalls

...Types of Firewalls A firewall is a network security system that filters the incoming and outgoing traffic on a computer network. Filtering allows what is wanted on a network and denies what is not wanted. Anywhere a computer is used to interact with and exchange resources with other computers, will require using a firewall. Four types of firewalls to consider are personal, commercial, appliance, and software firewalls. What each firewall is designed to do, along with any special requirements for using them, will be discussed as well. Personal firewalls are designed to protect individual computer systems or small networks. Personal firewalls allow a security policy to be defined for individual computers. Personal firewalls are useful to protect computers that can be moved across different networks. With a personal firewall, a laptop computer can be used at public Wi-Fi hotspots where strict security is required. The same laptop can also be used in the workplace where minimal protection is needed due to a conventional firewall usually already in place on a trusted intranet. Most personal firewalls usually do not require special training or certifications before being used. They usually have a friendly user interface, such as a graphical user interface, or GUI, which allows for easier use. Commercial firewalls are designed to provide protection for medium sized to large sized business networks. Most commercial firewalls are more complex than personal......

Words: 643 - Pages: 3

Free Essay

Firewalls: Guidelines and Procedures

...Firewalls: Guidelines and Procedures Introduction Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in other network environments. For example, many enterprise networks employ firewalls to restrict connectivity to and from the internal networks used to service more sensitive functions, such as accounting or personnel. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to its systems and resources. Inclusion of a proper firewall provides an additional layer of security (Broida, 2011). This research paper will give a background on firewalls. The background will cover an overview of firewall technologies, as well as firewall technologies, the common requirements of firewalls, and firewall policies. This paper will also give an analysis of firewalls which will consist of what I have learned in doing this research and my opinion on the research. Overview of Firewall Technologies Several types of firewall technologies are available. One way of comparing their capabilities is to look at the Transmission Control Protocol/Internet Protocol [TCP/IP] layers that each is able to examine. TCP/IP communications are composed of four layers that work together to transfer data between hosts. When a user wants to transfer data......

Words: 3077 - Pages: 13

Premium Essay

Firewalls Checkpoint

...Firewalls According to Regan (2004) firewall is a combination of hardware and software that serves as defense against external threats to a network system, a firewall’s task in a networked environment is to block communications not permitted by the security policy. Another function is to keep computer networks secure and safe by working as a barrier keeping destructive forces away from network systems. A firewall also controls traffic between different zones, typical the zones include an internal network, and the Internet. The main three types of firewalls are; dynamic packet filter, circuit gateway, and application gateway firewall. Dynamic packet filter is a firewall that supervises active connections and it uses the information obtained to determine what network packets are allowed to be processed through the firewall. This is done by recording data such port numbers as well as IP addresses. The way dynamic packet filter protects the company’s network is by configuring its firewall when a company authorizes employees to access external Internet it is safe because it is configured to only allow reply to the user’s information request back in. A Circuit Gateway firewall’s purpose is to configure a firewall to validate connections before data is exchanged. The Circuit Gateway functions at the OSI Model Transport Layer, the way in which traffic is filter mainly depends on specified session rules that are modified and allowed on specific computers. Using a Circuit......

Words: 381 - Pages: 2

Premium Essay

Importance of Firewall

...Importance of Firewall The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some cases users have a very lax opinion of what should and should not be allowed...

Words: 529 - Pages: 3

Premium Essay

Firewall

...Firewalls Overview Tutorial Firewalls This interactive will cover the aspects related to the utilization of firewalls in an organization. One important thing that needs to be kept in mind regarding firewalls is that they are commonly deployed at the organizational perimeter AND on the individual computers inside the organization. Since the perimeter firewall predated the single computer firewall perimeter firewalls are frequently referred to as firewalls. Firewalls protecting a single computer are called host based firewalls, software firewalls or client firewalls. While there are many ways to categorize perimeter firewalls, perhaps the most effective way is to look at them in terms of functionality. From a functional standpoint firewalls can be divided into Access Control List based, State Based and Application Proxy firewalls. The easiest way to understand the Access Control based firewall is to consider the fact that they can restrict traffic based on the source IP address of the packet. You would not want a packet coming in from the outside that has an IP address that should be INSIDE your organization. This might be from someone using a “SPOOFED” source IP address to attack your internal network resources. If you were receiving numerous packets from a single IP address this might be from someone trying to perform a Denial of Service (DoS) attack on you. Obviously you would want to block traffic from that IP address. Sometimes this functionality is...

Words: 421 - Pages: 2

Premium Essay

Importance of Firewall

...Importance of Firewall MedIQ is going in the right direction by adding a firewall in their network. The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some...

Words: 1017 - Pages: 5