What are the two limitations of static packet filtering

Assignment Help Basic Computer Science
Reference no: EM13984650

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

Topic 5 - Firewalls

Question 1

(a) what are the two limitations of static packet filtering? Explain why each limitation is bad.

(b) A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver, https://www.csu.edu.au. The firm also has a finance server that should only be accessible to people in the finance department. The server and the finance departments are all on the internal subnet 137.13.2.4. The firm has a single large site. How would you implement this policy? Create both a firewall architecture and ACLs for the border firewall for both internal and external connection-opening attempts.

Topic 6 - Host hardening

Question 2

(a) Why do you think companies often fail to harden their servers adequately? Justify your explanation.

(b) In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can only work when they have an Internet connection. Based on what you learned in this topic (Chapter 7), discuss security implications for netbooks, both pros and cons.

Topic 7 - Data protection

Question 3

(a) How much data would you lose if your computer's hard drive crashed right now? Could you reduce the amount of data that would be lost? How?

(b) Could you get enough information from the Internet to take out a loan in another person's name? You should provide any recent cases in Australia to support your explanation.

Topic 8 - Application security

Question 4

(a) Do you think programmers should be allowed to develop server-side dynamic webpages, given the dangers that are involved in doing so?

(b) A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

Reference no: EM13984650

Questions Cloud

Columbias management feels that the time value : Columbia's management feels that the time value of money should be considered in all long-term decisions. Briefly discuss the rationale that underlies management's belief.
Determine the phase angle of the circuit in degrees : Consider a series RLC circuit where R = 35.0 Ohm, C = 25.5 MuF, and L = 0.0940 H, driven at a frequency of 60.0 Hz. Determine the phase angle of the circuit In degrees.
Calculate the centroidal second moment of area : The moment of area for a rectangle about the horizontal axis is: Ixc = bh3/12. Calculate the centroidal second moment of area for the T-shaped region about the x-axis.
Evaluate prospect of borrowing money before the first game : Formulate and solve a linear programming model for Shannon that will help you advise her if she should lease the booth - Evaluate the prospect of borrowing money before the first game.
What are the two limitations of static packet filtering : In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can onl..
More volatile exchange rate and frequent financial crises : What is the Bretton Woods system? Why was it created and why did it collapse? How has this collapse ushered in more volatile exchange rate and frequent financial crises?
About partnership agreements : Whenever a partnership agreement is silent on this allocation of profits and losses, profit and losses are divided in the same proportion as capital contributions. Whenever a partnership agreement allocated losses in unequal proportions, but is silen..
How the dsm-5 plays a role in diagnosing : Discuss how the DSM-5 plays a role in diagnosing a psychological disorder. (Note: refer back to the Key Terms document which you have been using throughout the course)
Research the concept of an open economy : Now consider the United States' current economic situation. Share your overall opinion of the subject and if you believe the U.S. economy has benefited or suffered (or both). Do you agree or disagree with your classmates' arguments? If you agree, exp..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd