Write review for firewall placement

Assignment Help Software Engineering
Reference no: EM132182431

Write review for this article with 2 APA format references.

Discussion Forum - Firewall Placement

If the word firewall is mentioned in most conversations today, thoughts would immediately zero in on a special wall that is designed to confine or restrict a fire in a building from spreading to other areas in a building. When referring to network security, metaphorically the same can be said of its purpose. Walker (2014) explains that a firewall is an appliance within a network that is designed to protect internal resources from unauthorized external access (Walker, 2015).

Firewalls can be hardware devices with embedded OSs, or software installed on general-purpose computer systems. Firewalls serve two main purposes: controlling access to traffic entering an internal network and controlling traffic leaving an internal network. Currently, with the Microsoft Windows 10 operating systems, the dual hat firewall/antivirus application Windows Defender comes pre-installed with basic protection defaults "on". In this configuration, Windows Defender Antivirus works help protect your device by scanning for malicious or unwanted software and uses real-time protection to scan everything you download or run on your device (Microsoft, 2017).

This is a host-based application demanding a rigid resource standard that if not met will create havoc to system performance. In addition, a firewall placed at the perimeter of a business network can act as the first line of defense in protecting the network by monitoring and analyzing network traffic.

Although the most common use of a firewall is to protect the boundary of an organization's network, some companies use firewalls internally as well to protect network areas containing sensitive data, such as research or accounting information (Harwood, 2015). This firewall at the perimeter can also act as a Network Address Translator (NAT) preventing an outside host from initiating a connection to a host behind the NAT. When using multiple firewalls that have their policies configured properly, the System Administrator can be confident of the collected data and confirm suspicious activity when reviewing the firewall logs.

It is in this manner Christians should be like the Bereans of the early church mentioned in the book of Acts when it says 'now these Jews were more noble than those in Thessalonica; they received the word with all eagerness, examining the Scriptures daily to see if these things were so (Acts 17:11, ESV).

If network activity drives your policies and the policies are misconfigured, the impacted to the network can be crippling. NIST SP 800-41 rev 1(2009) states, crafting such policies is quite difficult because throttling and redirecting can cause desired traffic to be lost or have difficult to diagnose transient failures.

So with this in mind, Firewall policies must be carefully considered. Reference Harwood, M. (07/2015).

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition, Jones & Bartlett Learning, Burlington, MA Microsoft, (2017, November 30) Protect your PC.

Retrieved on November 26, 2018, Walker, M. (2015). CEH Certified Ethical Hacker All-in-One Exam Guide. McGraw-Hill Osborne Media. rs

Attachment:- Document.rar

Verified Expert

The paper is related to the firewall policies of the post. This paper also highlights the requirement of the new policies related to the peer post. This paper has been prepared in Microsoft Word Document.

Reference no: EM132182431

Questions Cloud

What are the main characteristics of each : As a member of JIM's acquisition team, you have been asked to look at various forms of acquisitions. Currently, it is JIM's plan to acquire Mason Machining.
Issues important to masses on political matters : Are there groups on campus that represent issues important to masses on political matters?
Second treatise of government by locke and politics : Using Second Treatise of Government by Locke and Politics by Aristotle, tell the differences between what kind of government Aristotle and Locke support?
What was impact of your r and d decisions on materials cost : What was the impact of your R&D decisions on materials cost? What other decisions were impacted by the increase or decrease?
Write review for firewall placement : Write review for article -Firewall Placement - explains that a firewall is an appliance within a network that is designed to protect internal resources
Do you think net neutrality is ethical and fair to business : Do you think Net Neutrality is ethical and fair to businesses? Fair to consumers. Why?
What is sovereignty : What is sovereignty? What is the purpose of government? Explain the origins of federalism as a part of American democracy
Evaluate the role of politics in everyday life : Evaluate the role of Politics in everyday life. And relate it to Aristole's findings regarding six types of government
Describe four structures of the american political system : Describe four structures of the American political system that have been responsible for maintaining two-party dominance.

Reviews

Write a Review

Software Engineering Questions & Answers

  Describes how the program will operate

Write an algorithm that describes how the program will operate - Prepare and document test cases that can be used to check that the program works correctly, once it has been coded.

  How to draw flow chart to read employee master file

How to draw a flow chart to read the employee master file and to output the number of employees in each department who have a basic degree

  Specifie the rules for the game of checkers

Write a decision table that specifies the rules for the game of checkers

  Discuss key problems associated with using packaged software

Discuss the key problems associated with using packaged software? How can these problems be minimized? Security and fitness of the software.

  Create a user sign-in form together with a registration form

Create a user sign-in form together with a registration form for new users - Create the data entry forms that are used for database administrative functions.

  Performing a binary xor operation on these two numbers

What is the binary result of performing a binary XOR operation on these two numbers?

  Magazines and periodicals were available in printed versions

1. Until fairly recently, magazines and periodicals were available in printed versions only. Publishers are now offering an increasing number of periodicals in either the traditional printed version or in a digital format that can be downloaded ov..

  How your organisation uses technology roadmaps

Create an initial post in which you analyse how your company uses technology roadmaps. In your analysis, address how successful or unsuccessful the company has been in implementing that roadmap

  Describe your view of a systems life cycle

Describe your view of a system's life cycle, explaining each phase / stage, based on your research. Idenitify your resource. Why did you select this article?

  What solutions to secure dns operation do you know

How do you think DNS is important for the Internet operation? What happen if DNS of your company/network, your provider or root DNS failures? What solutions to secure DNS operation do you know?

  Describe the relationship between nmap and zenmap

What are some reasons an information security professional would scan a system or network of systems and  why is it important to learn at least a few commonly used ports and their associated services?

  Explain the proposed e-commerce website

explain the proposed e-commerce Website and how it is new/different than other/or existing Websites.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd