Firewall analysis tools-information security, Computer Network Security

FIREWALL ANALYSIS TOOLS

There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of using same tools which attackers use should remember:

- It is intent of user which will dictate how information that is gathered will be used
- In order to defend a computer or network well, it is essential to understand ways it can be attacked.

Therefore, a tool which can help close up an open or poorly configured firewall will help network defender minimize risk from attack


 OPERATING SYSTEM DETECTION TOOLS


Detecting a target computer’s OS is quite valuable to an attacker to determine the susceptible vulnerabilities. There are many tools which use networking protocols to determine OS of a remote computer.

Posted Date: 10/9/2012 4:06:18 AM | Location : United States







Related Discussions:- Firewall analysis tools-information security, Assignment Help, Ask Question on Firewall analysis tools-information security, Get Answer, Expert's Help, Firewall analysis tools-information security Discussions

Write discussion on Firewall analysis tools-information security
Your posts are moderated
Related Questions
VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

implementing password policy in organisation

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec