Preview

ITNE455-1204A-01 U3GP3

Powerful Essays
Open Document
Open Document
5030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ITNE455-1204A-01 U3GP3
Abstract
Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.
Architecture Considerations for Perimeter Security
State-Based Filtering – Most firewalls today utilize state-based filtering. This filtering is a mechanism in modern firewall technology that maintains a list of current, active connection states that traverse the firewall (AIU Online, 2012). When an application inside the firewall requests a connection to another application running outside the firewall, a connection state is created. The addresses of the two communicating applications are saved in a table, so that the firewall can allow all traffic between them through until the initial connection is terminated. Without state-based connection monitoring and filtering, web pages would not display information as users would expect. This is because firewalls filter traffic using a combination of IP and port number. Web servers usually use port 80, but web based applications. Just as internet browsers, choose a random port number to listen on when a request is initiated. Without state-based filtering when the listening port number changes, the connection would be terminated and requested information would not be received. State-based or stateful filtering most significant advantage is that this technology allows the connection to stay open and active until the connection is terminated by the applications that requested the connection (Hinnerschietz, n.d.). Another name for state-based firewalls is circuit level gateways. Rather than



References: Adams, Karen, (2012). Types of Intrusion Prevention Systems. Retrieved September 6, 2012 from http://www.ehow.com/info_8039841_types-intrusion-prevention-systems.html AIU Online Beasley, J. (2009). Networking (2nd ed.). Boston: Pearson Education, Inc. The Benefits of Router-Integrated Session Border Control (2012) Retrieved from http://www.juniper.net/us/en/local/pdf/whitepapers/2000311-en.pdf Bradley, Tony, (2012) Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm Carter, Earl, (February 15, 2002) Little, M. (1989, October). Goals and Functional Requirements for Inter-Autonomous System Routing: RFC 1126. Retrieved from http://tools.ietf.org/html/rfc1126 Mansfield, K

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a) Firewalls: Controls the traffic flow between a trusted network and an untrusted network. Usually firewalls are used to protect the boundaries of a network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    Applications that use the Internet can have weaknesses when it comes to updates. Usually vendors will release patches to address some of these weaknesses when they are discovered. For some reason the full patch is not installed this now makes the application vulnerable. When the user downloads a document, media file, or even just a HTML page on this un-patched system the system can be compromised. With this happening this can cause more malware to be downloaded making the overall system worse. With the IPS in place the patches with the vulnerable application can be scanned by network traffic for patterns with the IPS it will help you will data about the network on a regular basis to see what is going on. With the IPS in place we will have the control to set it up with all the policy’s that are needed to help fight against any…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    A DMZ network has been set up to add another layer of security. A DMZ is layered defense created to limit access deeper into the network. Connected to that particular firewall is the addition of a storage router, that makes it now three routers in the network diagram as oppose to the two routers in the as-is diagram. To ensure software countermeasures, the deployment of anti-virus and firewall software for servers and computers are implemented. Anti-virus software for servers would operate at the database layer while other antivirus and software firewalls would operate at the client layer. The use of a personal firewall protects each of the client machines, creating a virtual layer.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    5. IP stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Business

    • 2429 Words
    • 10 Pages

    Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored…

    • 2429 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    Week5textbookquestions

    • 348 Words
    • 1 Page

    R29. Stateful packet filters maintain two data structures. Name them and briefly describe what they do.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Firewalls aim to provide organisations with reliable security at the network perimeter; however each firewall must be properly configured in order to allow and disallow network traffic accordingly, in a manner sensitive to business needs. Poorly configured firewalls can be overwhelmingly damaging to the security of an organisation – lax ingress rules may provide multiple vectors to attackers on the Internet, while lax egress rules may provide avenues for unauthorised command and control connections from the Internet and exfiltration of intellectual property and confidential data. Other factors must also be considered as part of a firewall configuration review, i.e. The software/firmware versions need to be identified in order to correlate with any publicly known issues or exploits with the specific device and version The network services available on the firewall also demand investigation and review against documented business requirements, including the number of registered users on the firewall and the password policies governing access to the device. IRM’s firewall configuration review provides an unbiased assessment of an organisation’s firewall deployments and the traffic that is currently permitted and denied through the organisation’s networks. The firewall configuration is validated against best practices in order to identify any misconfiguration that could lead to unauthorised and undesired access.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Better Essays

    2) P. E. Verissimo, N. F. Neves, and M. P. Correia. Intrusion-tolerant architectures: Concepts and design. In R. Lemos, C. Gacek, and A. Romanovsky, editors, Architecting Dependable Systems, volume 2677. 2003…

    • 1988 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Firewalls

    • 253 Words
    • 2 Pages

    There are three main types of firewalls that are used in the networking community. The three types are Network-level, Circuit-Level Gateway, and Application-Level. Network-level Fire walls work at the network level. It inspects packet headers and filter traffic based on their source and destination. According to "Pc Results Inc." (2013), "They also take into account IP addresses, ports used and services requested.” Circuit-level Gateway firewalls work by determining the legitimacy of a requested session. This is done by monitoring the handshake between packets. This type of firewall can hide a network from hackers in the outside world as well as restrict session rules to known computers. Application-level Gateway is also known as a proxies firewall. This firewall functions similar to a circuit level firewall. The exception being work on specific applications. According to "Pc Results Inc." (2013), "They protect the network from malicious attacks, spam and viruses. They can also block websites based on content and not IP address.”…

    • 253 Words
    • 2 Pages
    Satisfactory Essays

Related Topics