Firewall analysis tools-information security, Computer Network Security

FIREWALL ANALYSIS TOOLS

There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of using same tools which attackers use should remember:

- It is intent of user which will dictate how information that is gathered will be used
- In order to defend a computer or network well, it is essential to understand ways it can be attacked.

Therefore, a tool which can help close up an open or poorly configured firewall will help network defender minimize risk from attack


 OPERATING SYSTEM DETECTION TOOLS


Detecting a target computer’s OS is quite valuable to an attacker to determine the susceptible vulnerabilities. There are many tools which use networking protocols to determine OS of a remote computer.

Posted Date: 10/9/2012 4:06:18 AM | Location : United States







Related Discussions:- Firewall analysis tools-information security, Assignment Help, Ask Question on Firewall analysis tools-information security, Get Answer, Expert's Help, Firewall analysis tools-information security Discussions

Write discussion on Firewall analysis tools-information security
Your posts are moderated
Related Questions
BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

SDES encryption and decryption

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems


Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag