Firewall analysis tools-information security, Computer Network Security


There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of using same tools which attackers use should remember:

- It is intent of user which will dictate how information that is gathered will be used
- In order to defend a computer or network well, it is essential to understand ways it can be attacked.

Therefore, a tool which can help close up an open or poorly configured firewall will help network defender minimize risk from attack


Detecting a target computer’s OS is quite valuable to an attacker to determine the susceptible vulnerabilities. There are many tools which use networking protocols to determine OS of a remote computer.

Posted Date: 10/9/2012 4:06:18 AM | Location : United States

Related Discussions:- Firewall analysis tools-information security, Assignment Help, Ask Question on Firewall analysis tools-information security, Get Answer, Expert's Help, Firewall analysis tools-information security Discussions

Write discussion on Firewall analysis tools-information security
Your posts are moderated
Related Questions

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send