Preview

Computer Network Security and Firewall

Powerful Essays
Open Document
Open Document
2028 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Network Security and Firewall
Principals of Information Security 4th Edition Questions
Chapter 6 Questions 1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?
The relationship is that data is only limited to what firewalls allow via specific places called “ports”. There is the untrusted network on the outside, then the firewall which prevents unwanted or suspicious connections, and the trusted network is what lies within the bounds of the firewall.
2. What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types of packets?
A TCP Packet sends information, and reports back to the sender on progress to assure that information has been sent and received. UDP on the other hand is designed more for speed after establishing a connection and is used to strive for the fastest data retrieval rate as possible, but for this type of packet, it’s less important that it reports back. I don’t believe there will be specific transactions that involve both types of packets. But TCP is better for assuring that data is being received completely, but UDP focuses on assuring data is retrieved as quickly as possible.
3. How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server?
A packet-filtering firewall only allows “a particular packet with a particular source, destination, and port address to enter”. (POIS P.253) An application layer firewall is sometimes called a proxy server because it “runs special software that acts as a proxy for a service request” It is more to deal with outgoing connections and making connections within the DMZ zone of an organization.
4. How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security?
Static filtering works with rules that are already designated or “developed and installed with the firewall” and only a person can

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The main difference between the two is that OSI has broken down the TCP/IP’s application layer to Session, Presentation, and…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    TCP/IP is a suite of standards that computers use to communicate with across a medium4. TCP (transmission control protocol) is a protocol that requires a connection to transfer data from one node to another. UDP (user datagram protocol) does not require a connection. Information is split up into small sections called packets and sent over the medium. UDP does not require as much packet overhead as TCP and is more efficient to send data quickly. TCP is better for error checking of the data sent and received. Any protocol used has its…

    • 897 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Connection security rules require that network traffic allowed through the firewall use which of the following security mechanism?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. Placing a firewall between two routers and another firewall before a DMZ would be the best requirement choice to use…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 222

    • 395 Words
    • 2 Pages

    I. Connection Oriented Protocol – Establishes a network connection, manages the delivery of data, and terminates the connection.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    13. What is the Transport layer of TCP/IP? It is responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application…

    • 959 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This paper discusses the risks you face when you connect to the Internet, describes the types of attacks that can occur, and offers an overview of firewall technology, which can protect your network from hackers. Specifically, the paper discusses the implementation of a firewall and what you should consider in choosing the type of firewall you require.…

    • 2383 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Tcp/Ip

    • 1116 Words
    • 5 Pages

    At first glance, TCP/IP (Transmission Control Protocol/Internet Protocol) may seem baffling. Many other protocols, such as NetBEUI and IPX/SPX, require no configuration. TCP/IP is different. Due to the seemingly endless number of options that you can configure within TCP/IP, many people become intimidated at first. In reality, however, TCP/IP isn 't very difficult, but you have to gain some understanding of what you 're configuring. So, I 'm going to give you a crash course in TCP/IP. Although I won 't be able to explore every feature in detail, I 'll cover the important points.…

    • 1116 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    [6] Given this list of 4 firewall rules: what firewall rule protects from a distributed denial of service attack? Please explain the correct answer, choice “4” is wrong.…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Firewalls are network security tools that operate between the connection of an organization’s internal and the…

    • 2268 Words
    • 7 Pages
    Good Essays