Preview

ITNE455-1204A-01 U3GP3

Powerful Essays
Open Document
Open Document
5030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ITNE455-1204A-01 U3GP3
Abstract
Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.
Architecture Considerations for Perimeter Security
State-Based Filtering – Most firewalls today utilize state-based filtering. This filtering is a mechanism in modern firewall technology that maintains a list of current, active connection states that traverse the firewall (AIU Online, 2012). When an application inside the firewall requests a connection to another application running outside the firewall, a connection state is created. The addresses of the two communicating applications are saved in a table, so that the firewall can allow all traffic between them through until the initial connection is terminated. Without state-based connection monitoring and filtering, web pages would not display information as users would expect. This is because firewalls filter traffic using a combination of IP and port number. Web servers usually use port 80, but web based applications. Just as internet browsers, choose a random port number to listen on when a request is initiated. Without state-based filtering when the listening port number changes, the connection would be terminated and requested information would not be received. State-based or stateful filtering most significant advantage is that this technology allows the connection to stay open and active until the connection is terminated by the applications that requested the connection (Hinnerschietz, n.d.). Another name for state-based firewalls is circuit level gateways. Rather than



References: Adams, Karen, (2012). Types of Intrusion Prevention Systems. Retrieved September 6, 2012 from http://www.ehow.com/info_8039841_types-intrusion-prevention-systems.html AIU Online Beasley, J. (2009). Networking (2nd ed.). Boston: Pearson Education, Inc. The Benefits of Router-Integrated Session Border Control (2012) Retrieved from http://www.juniper.net/us/en/local/pdf/whitepapers/2000311-en.pdf Bradley, Tony, (2012) Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm Carter, Earl, (February 15, 2002) Little, M. (1989, October). Goals and Functional Requirements for Inter-Autonomous System Routing: RFC 1126. Retrieved from http://tools.ietf.org/html/rfc1126 Mansfield, K

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    The purpose of this summary is to explain the changes made in the to-be diagram from the previous as-is diagram. Also, to note the protective hardware added, and the justification for the changes made. The to-be diagram has been changed or altered to reflect a defense in depth approach. This diagram is upgraded with the addition of multiple security layers. This diagram has the removal of its wireless access points and the addition of VLAN subnetting for improving network performance and reducing network congestion.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    5. IP stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Business

    • 2429 Words
    • 10 Pages

    Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored…

    • 2429 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Week5textbookquestions

    • 348 Words
    • 1 Page

    R29. Stateful packet filters maintain two data structures. Name them and briefly describe what they do.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Firewalls aim to provide organisations with reliable security at the network perimeter; however each firewall must be properly configured in order to allow and disallow network traffic accordingly, in a manner sensitive to business needs. Poorly configured firewalls can be overwhelmingly damaging to the security of an organisation – lax ingress rules may provide multiple vectors to attackers on the Internet, while lax egress rules may provide avenues for unauthorised command and control connections from the Internet and exfiltration of intellectual property and confidential data. Other factors must also be considered as part of a firewall configuration review, i.e. The software/firmware versions need to be identified in order to correlate with any publicly known issues or exploits with the specific device and version The network services available on the firewall also demand investigation and review against documented business requirements, including the number of registered users on the firewall and the password policies governing access to the device. IRM’s firewall configuration review provides an unbiased assessment of an organisation’s firewall deployments and the traffic that is currently permitted and denied through the organisation’s networks. The firewall configuration is validated against best practices in order to identify any misconfiguration that could lead to unauthorised and undesired access.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Firewalls

    • 253 Words
    • 2 Pages

    There are three main types of firewalls that are used in the networking community. The three types are Network-level, Circuit-Level Gateway, and Application-Level. Network-level Fire walls work at the network level. It inspects packet headers and filter traffic based on their source and destination. According to "Pc Results Inc." (2013), "They also take into account IP addresses, ports used and services requested.” Circuit-level Gateway firewalls work by determining the legitimacy of a requested session. This is done by monitoring the handshake between packets. This type of firewall can hide a network from hackers in the outside world as well as restrict session rules to known computers. Application-level Gateway is also known as a proxies firewall. This firewall functions similar to a circuit level firewall. The exception being work on specific applications. According to "Pc Results Inc." (2013), "They protect the network from malicious attacks, spam and viruses. They can also block websites based on content and not IP address.”…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    2) P. E. Verissimo, N. F. Neves, and M. P. Correia. Intrusion-tolerant architectures: Concepts and design. In R. Lemos, C. Gacek, and A. Romanovsky, editors, Architecting Dependable Systems, volume 2677. 2003…

    • 1988 Words
    • 7 Pages
    Better Essays

Related Topics