How you implement a firewall solution for organization

Assignment Help Computer Networking
Reference no: EM13753015

1. There are many different types of firewalls that exist in the industry (e.g., Cisco, Juniper, 3Com, etc.). Explain what makes Smoothwall different.

2. Firewalls operate on a multitude of layers; for example, application firewalls operate at the application layer, network firewalls at the network layer, and proxy firewalls at the transport and session layers. Furthermore, firewall placement also makes a difference. The firewall can be placed at the core, on a LAN segment, or even locally on an end-user system. Describe how you implement a firewall solution for a large organization with only system (end point) firewalls (i.e., Microsoft XP firewall). Explain the challenges of not having a firewall which is centrally located at the network's core and not having a firewall between the DMZ and Internet.

3. VPN technology can easily be considered a security feature. However, when designing a VPN solution for a company, there are a number of different personnel outside of IT security that need to be involved. Imagine you are implementing a VPN solution for the first time for a well-known known private University, University of STU, consisting of 2,000 staff, 700 faculty, and 20,000 students. Identify the personnel, including their titles and departments, you would involve in such an implementation. Additionally, describe how you would use each person as a resource.

4. Offer a VPN solution for the following: Fred is an employee of company WNS Inc. As part of his job, he travels internationally on a very frequent basis. In fact, he is rarely ever at the corporate office and, therefore, his desktop at work continues to accumulate dust. Fred performs most of his work from his laptop, but is highly discouraged from saving information locally to the laptop for fear of loss or theft of the laptop. The information that Fred works on during his travels is the core of the company and is probably worth billions of dollars. Describe a possible VPN solution for Fred. Be sure to include limitations.

5. Recommend ways to use social media in stakeholder management. This can include social media features in software such as chatter in salesforce or the ability to +1 in Google groups when used as intranets.

Reference no: EM13753015

Questions Cloud

Write a research paper on campaign finance reform : write a research paper on Campaign finance reform, Immigration amendmentc, Federalism reforms, Welfare reform, Health care reform, Gay marriages reform, Military spending reformh and Don't ask Don't tell reform.
Prepare journal entries and financial statements : Prepare journal entries and financial statements for the year ended December 31, 2014. No adjusting entries have been made since December 31, 2013. On November 1, 2014, Company A. rented storage space at a cost of $600 per month. On that date Company..
Assignment on analyzing world cultures : Identify two-three online videos or movies representative of this culture. These could be examples of cultural expressions such as a, Bollywood movie from India or Anime videos from Japan.
Advise albert stanley on his course of action : Analyze the situation - and advise Albert Stanley on his course of action
How you implement a firewall solution for organization : Describe how you implement a firewall solution for a large organization with only system (end point) firewalls (i.e., Microsoft XP firewall). Explain the challenges of not having a firewall which is centrally located at the network's core and not ..
Employees should be loyal to their bosses : "Employees should be loyal to their bosses." What is the meaning of the above quote? How would you answer the question, What is more important, to be true to oneself or to be true to one's company?
Most associated with managerial accounting : Which of the following is most associated with managerial accounting? a) must follow GAAP b)may rely on estimates and forecast c) is prepared for users outside the organization d) always reports to the entire entity
How to record the adjustment on a journal : How to record the adjustment on a journal: Employee salaries in the amount of $55,000 were incurred for the year. Of that amount $50,000 had been paid in cash, the remainder was still owed to employees at the end of the year. Record the journal entry..
Adjustment required for the investment account : On May 20, 2013, Montero Co. paid $1,000,000 to acquire 40% of ORD Corp.’s outstanding stock. Also assume that ORD Corp. paid a $100,000 dividend on November 1, 2013, and reported a net income of $700,000 for 2013. (a) Prepare the entry to record the..

Reviews

Write a Review

Computer Networking Questions & Answers

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

  Upgrading bus topology to a star topology lan

You are requested to upgrade bus topology LAN at a friend's house to a star topology LAN. your friend wishes to connect three computers.

  How to utilize lirn successfully

Write a research paper (excluding the title page) on stack addressing and local variables You can visit the Academic Resource Center for a guide on how to utilize LIRN successfully.

  A let deskp denote the des encryption of the plain text p

a let deskp denote the des encryption of the plain text p by the key k.i if we set k to be the key consisting of all

  Create a domain local group

Create a domain local group, a global group, and make the global group a member of the domain local group.

  Draft a six- to eight-page paper based on a life-changing

draft a six- to eight-page paper based upon a life-changing decision you or someone in your community has had to make.

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  Web server with one cpu that serves web requests

Suppose a web server with one CPU that serves web requests; each web request requires three (time) units of CPU processing and 9 (time) units to read data from disk.

  Why is it significant to secure windows and unix servers

CIO has asked you to describe why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Design-program and implement pcs system

You are hired to design, program and implement the PCS system which management calls the Sales and Inventory Management System.

  Explain current standards and policies with star clothing

In context of telecommunications standards and policy, create 3-5 page white paper which explains current standards and policies which are suitable to MCG's work with Star Clothing.

  Distinguish traffic in current isp backbones-manage quality

Based on reading, is there pressing require to distinguish traffic in current ISP backbones to manage quality of service? Explain why or why not.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd