Define security requirements within different security zones

Assignment Help Computer Engineering
Reference no: EM131724240

Assignment Objectives:

Describe network perimeter security methods and tools.

Describe the different types of firewalls and how these firewalls are used to improve network security.

Describe the different types of Intrusion Detection Systems (IDSs) and how an IDS is used to improve security.

Purpose:

There are many security devices that are used to protect the network perimeter. Firewalls and intrusion detection and prevention systems are commonly used for providing that protection. It is important to understand how these devices fit into the network security plan.

Assignment Description: Firewalls and Intrusion Detection and Prevention Systems

Both firewalls and intrusion detection and prevention systems are used extensively in network security, including protecting the network perimeter. They will be configured based on where they are located and the security requirements within that security zone.

Write a 3-4 page paper in which you:

Describe the different types of firewalls.

Analyze how the security requirements within different security zones will impact the firewall configurations.

Describe the purpose of a intrusion detection system, intrusion prevention system, and intrusion detection and prevention system.

Assess the effectiveness of these devices in protecting the perimeter of the network. Include an explanation of what they do protect and what they do not protect.

Examine the standards and protocols used in the development of network perimeter devices, and address if more or less standardization is needed, and how that will improve the security of network perimeter devices as a whole.

Reference no: EM131724240

Questions Cloud

Expected return on the market be : A stock has an expected return of 14 percent, its beta is 1.20, and the risk-free rate is 5.8 percent. What must the expected return on the market be?
Explain how each mechanism provides the service : security mechanisms (controls) can be used to support the communication security services below, and explain how each mechanism provides the service
Firm is paper converter : Your firm is a paper converter. It converts paperboards into various articles used in homes and restaurants for food preparation, sale, and storage.
Define authentic as a result of the user authentication : Explain to what degree the service provider can assume that the data received during the session are authentic as a result of the user authentication
Define security requirements within different security zones : Analyze how the security requirements within different security zones will impact the firewall configurations
Public relations strategies take on global perspective : What new challenges emerge when public relations strategies take on a global perspective?
Draw a bar graph of the row percentages : In a class survey, statistics students at a university were asked, "Regarding your weight, do you think you are: About right? Overweight? Under weight?"
Discuss why groupthink takes place : Discuss why groupthink takes place. What characteristics of a group most often lead to groupthink?
Diversity create competitive advantages for companies : How do you see the face of the workforce in 20 years? In what ways will continued diversity create competitive advantages for companies?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd