Firewall analysis tools-information security, Computer Network Security


There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of using same tools which attackers use should remember:

- It is intent of user which will dictate how information that is gathered will be used
- In order to defend a computer or network well, it is essential to understand ways it can be attacked.

Therefore, a tool which can help close up an open or poorly configured firewall will help network defender minimize risk from attack


Detecting a target computer’s OS is quite valuable to an attacker to determine the susceptible vulnerabilities. There are many tools which use networking protocols to determine OS of a remote computer.

Posted Date: 10/9/2012 4:06:18 AM | Location : United States

Related Discussions:- Firewall analysis tools-information security, Assignment Help, Ask Question on Firewall analysis tools-information security, Get Answer, Expert's Help, Firewall analysis tools-information security Discussions

Write discussion on Firewall analysis tools-information security
Your posts are moderated
Related Questions
what is relation ship between computer security goals?

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I