Preview

Computer Network Security and Firewall

Powerful Essays
Open Document
Open Document
2028 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Network Security and Firewall
Principals of Information Security 4th Edition Questions
Chapter 6 Questions 1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?
The relationship is that data is only limited to what firewalls allow via specific places called “ports”. There is the untrusted network on the outside, then the firewall which prevents unwanted or suspicious connections, and the trusted network is what lies within the bounds of the firewall.
2. What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types of packets?
A TCP Packet sends information, and reports back to the sender on progress to assure that information has been sent and received. UDP on the other hand is designed more for speed after establishing a connection and is used to strive for the fastest data retrieval rate as possible, but for this type of packet, it’s less important that it reports back. I don’t believe there will be specific transactions that involve both types of packets. But TCP is better for assuring that data is being received completely, but UDP focuses on assuring data is retrieved as quickly as possible.
3. How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server?
A packet-filtering firewall only allows “a particular packet with a particular source, destination, and port address to enter”. (POIS P.253) An application layer firewall is sometimes called a proxy server because it “runs special software that acts as a proxy for a service request” It is more to deal with outgoing connections and making connections within the DMZ zone of an organization.
4. How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security?
Static filtering works with rules that are already designated or “developed and installed with the firewall” and only a person can

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Connection security rules require that network traffic allowed through the firewall use which of the following security mechanism?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 222

    • 395 Words
    • 2 Pages

    I. Connection Oriented Protocol – Establishes a network connection, manages the delivery of data, and terminates the connection.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    5. What is the difference between a traditional IP Stateful Firewall and a Deep Packet Inspection Firewall?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    13. What is the Transport layer of TCP/IP? It is responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application…

    • 959 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Application Layer which provides us interaction and access to all applications on the computer. (Word processing, email, excel etc. etc.)…

    • 992 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    [6] Given this list of 4 firewall rules: what firewall rule protects from a distributed denial of service attack? Please explain the correct answer, choice “4” is wrong.…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This paper discusses the risks you face when you connect to the Internet, describes the types of attacks that can occur, and offers an overview of firewall technology, which can protect your network from hackers. Specifically, the paper discusses the implementation of a firewall and what you should consider in choosing the type of firewall you require.…

    • 2383 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Tcp/Ip

    • 1116 Words
    • 5 Pages

    At first glance, TCP/IP (Transmission Control Protocol/Internet Protocol) may seem baffling. Many other protocols, such as NetBEUI and IPX/SPX, require no configuration. TCP/IP is different. Due to the seemingly endless number of options that you can configure within TCP/IP, many people become intimidated at first. In reality, however, TCP/IP isn 't very difficult, but you have to gain some understanding of what you 're configuring. So, I 'm going to give you a crash course in TCP/IP. Although I won 't be able to explore every feature in detail, I 'll cover the important points.…

    • 1116 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Osi Model Security Memo

    • 407 Words
    • 2 Pages

    The data link layer establishes the connection for the physical layer and turns the data from higher layers into the bits that will be transmitted across the medium. Security for the data link layer can be accomplished with port security, MAC address filtering, and wireless encryption.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Security

    • 637 Words
    • 3 Pages

    Another threat is IP Spoofing. This is accomplished by providing fabricated information about a person’s or host’s identity to obtain unauthorized access to a system. By enabling packet filters at the entry and exit points of your networks you can best guard against spoofing. The external entry point filters should…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Firewalls are network security tools that operate between the connection of an organization’s internal and the…

    • 2268 Words
    • 7 Pages
    Good Essays