What are the two limitations of static packet filtering

Assignment Help Basic Computer Science
Reference no: EM13984650

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

Topic 5 - Firewalls

Question 1

(a) what are the two limitations of static packet filtering? Explain why each limitation is bad.

(b) A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver, https://www.csu.edu.au. The firm also has a finance server that should only be accessible to people in the finance department. The server and the finance departments are all on the internal subnet 137.13.2.4. The firm has a single large site. How would you implement this policy? Create both a firewall architecture and ACLs for the border firewall for both internal and external connection-opening attempts.

Topic 6 - Host hardening

Question 2

(a) Why do you think companies often fail to harden their servers adequately? Justify your explanation.

(b) In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can only work when they have an Internet connection. Based on what you learned in this topic (Chapter 7), discuss security implications for netbooks, both pros and cons.

Topic 7 - Data protection

Question 3

(a) How much data would you lose if your computer's hard drive crashed right now? Could you reduce the amount of data that would be lost? How?

(b) Could you get enough information from the Internet to take out a loan in another person's name? You should provide any recent cases in Australia to support your explanation.

Topic 8 - Application security

Question 4

(a) Do you think programmers should be allowed to develop server-side dynamic webpages, given the dangers that are involved in doing so?

(b) A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

Reference no: EM13984650

Questions Cloud

Columbias management feels that the time value : Columbia's management feels that the time value of money should be considered in all long-term decisions. Briefly discuss the rationale that underlies management's belief.
Determine the phase angle of the circuit in degrees : Consider a series RLC circuit where R = 35.0 Ohm, C = 25.5 MuF, and L = 0.0940 H, driven at a frequency of 60.0 Hz. Determine the phase angle of the circuit In degrees.
Calculate the centroidal second moment of area : The moment of area for a rectangle about the horizontal axis is: Ixc = bh3/12. Calculate the centroidal second moment of area for the T-shaped region about the x-axis.
Evaluate prospect of borrowing money before the first game : Formulate and solve a linear programming model for Shannon that will help you advise her if she should lease the booth - Evaluate the prospect of borrowing money before the first game.
What are the two limitations of static packet filtering : In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can onl..
More volatile exchange rate and frequent financial crises : What is the Bretton Woods system? Why was it created and why did it collapse? How has this collapse ushered in more volatile exchange rate and frequent financial crises?
About partnership agreements : Whenever a partnership agreement is silent on this allocation of profits and losses, profit and losses are divided in the same proportion as capital contributions. Whenever a partnership agreement allocated losses in unequal proportions, but is silen..
How the dsm-5 plays a role in diagnosing : Discuss how the DSM-5 plays a role in diagnosing a psychological disorder. (Note: refer back to the Key Terms document which you have been using throughout the course)
Research the concept of an open economy : Now consider the United States' current economic situation. Share your overall opinion of the subject and if you believe the U.S. economy has benefited or suffered (or both). Do you agree or disagree with your classmates' arguments? If you agree, exp..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining distributed music in physical cds and mp3 files

For some time, popular music has been distributed on physical CDs. It can now be distributed in MP3 files. Explain the nature of the similarity or difference.

  Database-related except the history of databases

You can write about anything database-related except the history of databases. You must find something that relates to current and future issues in databases; the following Web site, www.sqlservercentral.com, is an excellent source for ideas.

  What is the technique called

In the transport layer, data transmission is controlled to ensure data integrity and avoid data loss. What is the technique called?

  Describe the formula for elasticity of demand

O. Describe the formula for elasticity of demand for labor as well as the significance of elastic versus inelastic findings. How does this compare with the elasticity of labor supply? P. What is the labor-leisure trade-off? On figure 8.5, describe t..

  Develop an analysis of the impacts such a development

Explain why you think the impact will or will not occur, cite sources when necessary, and justify your position using APA format.

  Set the character variable r=0

Write a small program that will set the character variable R=0

  Assignment on predictive policing

In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify "hotspot..

  Data blocks accesses to fetch record using linear search

How many data blocks accesses on the average are required to fetch the record using linear search? How many data blocks accesses are required to fetch a record using binary search?

  The chinese government from search results

1. (a) Assume that you work as the senior vice president for international markets for Google. Your job is to prepare the company for its move into China. During negotiations with Chinese officials, you are given the following ultimatum: remove all l..

  Derivea list of at least 10 design principles

For your first assignment, you will begin to look at the world with "designer's eyes," reflecting on the things with which you interact, and the quality of that interaction. Pay attention to anything and everything with which you interact: from do..

  Data execution protection

Data Execution Protection

  Problem of traveling from one city to another

Describe how the problem of traveling from one city to another could be framed as a production system. What are the states? What are the productions?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd