Firewall analysis tools-information security, Computer Network Security

FIREWALL ANALYSIS TOOLS

There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of using same tools which attackers use should remember:

- It is intent of user which will dictate how information that is gathered will be used
- In order to defend a computer or network well, it is essential to understand ways it can be attacked.

Therefore, a tool which can help close up an open or poorly configured firewall will help network defender minimize risk from attack


 OPERATING SYSTEM DETECTION TOOLS


Detecting a target computer’s OS is quite valuable to an attacker to determine the susceptible vulnerabilities. There are many tools which use networking protocols to determine OS of a remote computer.

Posted Date: 10/9/2012 4:06:18 AM | Location : United States







Related Discussions:- Firewall analysis tools-information security, Assignment Help, Ask Question on Firewall analysis tools-information security, Get Answer, Expert's Help, Firewall analysis tools-information security Discussions

Write discussion on Firewall analysis tools-information security
Your posts are moderated
Related Questions

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

what are the participant of marketing channal?

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal