What are the two limitations of static packet filtering

Assignment Help Basic Computer Science
Reference no: EM13984650

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

Topic 5 - Firewalls

Question 1

(a) what are the two limitations of static packet filtering? Explain why each limitation is bad.

(b) A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver, https://www.csu.edu.au. The firm also has a finance server that should only be accessible to people in the finance department. The server and the finance departments are all on the internal subnet 137.13.2.4. The firm has a single large site. How would you implement this policy? Create both a firewall architecture and ACLs for the border firewall for both internal and external connection-opening attempts.

Topic 6 - Host hardening

Question 2

(a) Why do you think companies often fail to harden their servers adequately? Justify your explanation.

(b) In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can only work when they have an Internet connection. Based on what you learned in this topic (Chapter 7), discuss security implications for netbooks, both pros and cons.

Topic 7 - Data protection

Question 3

(a) How much data would you lose if your computer's hard drive crashed right now? Could you reduce the amount of data that would be lost? How?

(b) Could you get enough information from the Internet to take out a loan in another person's name? You should provide any recent cases in Australia to support your explanation.

Topic 8 - Application security

Question 4

(a) Do you think programmers should be allowed to develop server-side dynamic webpages, given the dangers that are involved in doing so?

(b) A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

Reference no: EM13984650

Questions Cloud

Columbias management feels that the time value : Columbia's management feels that the time value of money should be considered in all long-term decisions. Briefly discuss the rationale that underlies management's belief.
Determine the phase angle of the circuit in degrees : Consider a series RLC circuit where R = 35.0 Ohm, C = 25.5 MuF, and L = 0.0940 H, driven at a frequency of 60.0 Hz. Determine the phase angle of the circuit In degrees.
Calculate the centroidal second moment of area : The moment of area for a rectangle about the horizontal axis is: Ixc = bh3/12. Calculate the centroidal second moment of area for the T-shaped region about the x-axis.
Evaluate prospect of borrowing money before the first game : Formulate and solve a linear programming model for Shannon that will help you advise her if she should lease the booth - Evaluate the prospect of borrowing money before the first game.
What are the two limitations of static packet filtering : In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can onl..
More volatile exchange rate and frequent financial crises : What is the Bretton Woods system? Why was it created and why did it collapse? How has this collapse ushered in more volatile exchange rate and frequent financial crises?
About partnership agreements : Whenever a partnership agreement is silent on this allocation of profits and losses, profit and losses are divided in the same proportion as capital contributions. Whenever a partnership agreement allocated losses in unequal proportions, but is silen..
How the dsm-5 plays a role in diagnosing : Discuss how the DSM-5 plays a role in diagnosing a psychological disorder. (Note: refer back to the Key Terms document which you have been using throughout the course)
Research the concept of an open economy : Now consider the United States' current economic situation. Share your overall opinion of the subject and if you believe the U.S. economy has benefited or suffered (or both). Do you agree or disagree with your classmates' arguments? If you agree, exp..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Program to compute each semester tuition for each student

write a program to compute each semester the tuition for each student. Studient is taking 12 credit or less, tuition is 675 oer credit if student is taking more than 12 credits the total tuition is 6300.

  Discussing two of the additional dba responsibilities

Write a 500-1000 word paper using Word discussing two of the additional DBA responsibilities. Use at least two sources outside your text for this paper. Do not use Wikipedia. Use APA format for the paper, and be sure to cite all your sources using AP..

  Assignment whole disk encryption solutions

Mention at least three situations where Whole Disk Encryption (WED) solutions are required. What are the advantages of using the Registry instead of initialization (.ini) files. Explain your answers.

  Compare and contrast the data communication technologies

Compare and contrast the data communication technologies of guided media and unguided media. This should include transmission media, data link control protocols, and multiplexing. Compare digital transmission to analog transmission to determine the a..

  Create a home page with navigation bar

Create a home page with navigation bar

  Explain why it is important to document quality procedures

Explain why it is important to document quality procedures at the beginning of a project rather than later on. In addition, think about 2 advantages and 2 disadvantages of using standards for documentation in each of the software phases.

  Evaluate the megatrend of demographics in the it field

Evaluate the megatrend of demographics in the IT field. Give your opinion as to why IT managers must understand this megatrend when selecting talent for organizational positions.

  Create the class diagram and write the code

Create the class diagram and write the code that defines the class and implements the mutator methods.

  Programming in three different languages for dijkstra

Write a program that will compute the shortest-path tree rooted at nodes as noted in the networks (Figure 1, 2, and 3) provided below by using the Dijsktra algorithm, as explained in the class and in the book. You can use any programming language ..

  The two main forms of documentation

The two main forms of documentation of program design are flowcharts and pseudcode. Based on this week's text chapter and some relevant web resources, discuss the differences between flowcharts and pseudocode, as well as their merits and faults.

  It-corporate transformation

List and explain all the business opportunities or the business values that are created by the network economy.  How do human capital, structural capital, and customer capital differ? Please analyse each and provide supporting facts.

  Computer crime techniques

Computer Crime Techniques

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd