Explaining the type of firewall

Assignment Help Operating System
Reference no: EM1379562

1 - Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?

In the #2 please give your own opinion if you agree or disagree and why. Like discussion.

2 - Yes there will be cases where we need multiples firewalls in on the same network or same network segment. Suppose a network where we have multiple servers with high or confidential data. To protect the database access from some of the workstation we can install a firewall access between the server containing this database and the other servers. Even Thought this protection can be done with other methods like group policy and access restriction a firewall will simply look at anything behind that server as external, which gives more protection. The same think can be done on the same network segment by installing an extra firewall for example between an IT testing computer and the other network computer to avoid that other computers been contaminated with some virus testing and installation on the IT computer.

3 - Many people think that firewalls are a complete security solution and as long as they've installed one on their Internet-attached LAN, they're safe. What's wrong with this argument?

4 - In fact firewall can not be the complete security option. Thinking that installing a firewall gives a total protection for the network is a wrong idea. Firewall is a software or combination of hardware and software that limits the network access according to defined rules. This simply means that a firewall can do many things but if the rules are not properly defined inside the firewall, the firewall can just seats there as a simple decoration tool. The other thing about the firewall is that it is basically designed to protect the network from outside attack. How about the potential inside attacker? From this point of view the firewall is meaningless. More than having a firewall with a well-defined rules, we should also consider putting in place some security measures to protect our network.

 

Reference no: EM1379562

Questions Cloud

Multicast service model in the internet : Those applications that do not need a high level of reliability for operations can use the Minimalist Internet Multicast service model, like streaming of continues information in the forms of audio or video
Explain the concepts of nat and ipv6 : At present we have a huge problem with advertising corporations which are making profiles of people by collecting their information.
Finding server side software : Find the Internet to search server side software that is needed to be installed on the hospital's servers to support access by your local hospital doctors to patients' data using their cellular phones or PDAs.
Performing the maintenance : A hard drive must be managed to be used most efficiently. This maintenance with deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, discovering and attempting to correct disk failures.
Explaining the type of firewall : Can you think of conditions that call for multiple firewalls on the similar network or similar network segment? Discuss why might you firewall off two or more connections into a subnetwork?
Stateful inspection packet filtering routers : Name two benefits of Stateful Inspection Packet Filtering Routers. Name two benefits that firewalls add to a network
Solving passwords problems : As we all know about problems with people and passwords and how technology can mitigate some of them. What types of problems do you assume implementing these technologies for people might cause?
Creating hipo charts and decision tables : Now that you have a program design and a selected programming language for your assignment, you can start looking at the logical flow of the processes within your program and the data that is input,
Question about vpn communications : Discuss how routers and firewalls and IDSs inspect inbound and outbound traffic and explain how we use those features to our benefits in securing the network.

Reviews

Write a Review

Operating System Questions & Answers

  Explain page trace analysis using fifo

Increase size of memory so it contains four page frames for public use. Using same page request as above and FIFO, do another page trace analysis and calculate the failure and success ratio.

  Creating er diagram

Construct a table for consumer. The manager tells me that this table needs to track the following data: all consumers' social security number, first and last name, address, city,

  How operating system is clearly superior for any application

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. If you don't think that one operating system is clearly superior for this application, describe why.

  Creating the source code and flowchart

Construct a C program that displays a title, "Hello World." Insert comments in the event to document the program internally. Attach a design flow chart.

  Saving the customer user accounts

A local beauty corporation has implemented a website to boost sales and awareness of products they manufacture. The website will contain data about the firm and all products available.

  Programming language machine independence

Discuss and explain the main factors that influence programming language machine independence, and how higher levels of machine independence could be achieved.

  Role and responsibilities of a network administrator

Create a job description of the role and responsibilities of a network administrator. Provide a detailed list of personal traits and skills necessary for a person to be a highly effective network administrator.

  Network security principles

Explain a recent high profile computer security issue that you have heard of. Based on basic network security principles, how might the issue have been avoided?

  Design virtual memory system for new operating system

You are asked to design the virtual memory system for a new operating system working on small mobile devices. The memory operates at 333 MHz with a word size of 4 bytes.

  Identifying communication techniques

Explain the techniques that will be used to monitor implementation of the electronic medical record.

  Discuss and provide examples of mutual exclusion

Discuss and provide examples of the following concurrency issues associated with an OS: 1. Mutual exclusion 2. Deadlock 3. Starvation

  Implement a basic shell that restricts runtime of processes

Implement a basic shell that restricts the runtime of processes executed from within it. Your shell will read input from the users and execute it as a new process, but if that program runs longer than it should, your shell will kill the process an..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd