Question

In: Computer Science

Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network...

  • Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network - including a specific focus on how each helps protect the network from being hacked from both inside and outside the network.

Assignment Objectives:

  1. Configure security devices and procedures to counter malicious hacking activities.
  2. Analyze firewall technology and tools for configuring firewalls and routers.
  3. Discuss intrusion detection and prevention systems and Web-filtering technology.
  4. Explain the purpose of honeypots.

500 words or more, please.

Solutions

Expert Solution

Solution)

The router is a device belong to network. The main goal of this router is passing packets in between the computing of the network after that it will helps to carry out the function of the traffic directing on the internet. The router will attaching 2 or more data lines from the different or various types of network. The router belongs to both software as well as hardware, recent days more companies produces security oriented routers. The router is carrying entire security of the local network, the router holding different types of security functions such as firewall, VPN handling and few other functions. The network address translation done by routers and also stateful packet inspection is also done by routers.

FIREWALL:

Firewall is like a bridge in middle of security policy and also network. Firewall is so famous on internet and the firewall protects the network from unauthorized accesses, The firewall could be used in each device on the network

DMz:

DMz will saparates the lan from various doubtful networks, it was the physical network and also it will give security for network, cause it will restricts the access from the unauthorized or access from hackers directly.

1)IDPS:

It will used in both technologies such as ips and also ids , The ids using for automate detection process of the instructions, the ips is useful to reduce of preventing the incidents.

2)HONEYPOTS:

it will used for alleviate risks and complications in computer network, and it will be provides the prevention, detection and also provide responses. It was good tool to find details belongs to hackers or attackers.

3)The technology of the security protect against entire spiteful files, the firewall protects the network from unauthorized accesses.

4) The firewall carry protection to the router handles and computer the traffic sending to the internet protocol (IP) address.

I HOPE THIS ANSWER WILL HELP YOU PLEASE DO UP VOTE IT MEANS A LOT TO ME THANK YOU.


Related Solutions

describe following about the router d. Border router e. an exterior router f. Describe a Routing...
describe following about the router d. Border router e. an exterior router f. Describe a Routing table g. What is the best path, and how is it defined? Give an example h. Describe the following commands and give an example of its use • Route • Netstat • tracert
A ping fails when performed from router R1 to directly connected router R2. The network administrator...
A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. What is CDP protocol? Why would the network administrator issue this command if the ping failed between the two routers? You have been hired at AABC Inc. to help with an important network project. The network administrator has given you the internal IP address of 192.168.10.0/24 that need to have access to the corporate server...
What happens when a router receives a packet for a network that isn't listed in the...
What happens when a router receives a packet for a network that isn't listed in the routing table? Select one: a. The router will use RIP to inform the host the packet is undeliverable. b. The router sends the packet to the next available router. c. The packet is held until routing table is updated with the required address. d. The packet will be discarded. Each input port of a router has a local copy of the router's forwarding table....
You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  
There is no question the router plays a vital role in networking. If this device were...
There is no question the router plays a vital role in networking. If this device were to be controlled by an attacker, then the entire CIA goal can be violated. As such, you can argue about the need to protect the router administratively, physically, and technically. Our focus again is on the technical part. Having said this, discuss the methods that can be used on a standard IOS router that will prevent unauthorized access to the router. Also, discuss how...
What role does a firewall play in a honey pot design?
What role does a firewall play in a honey pot design?
Describe the purpose of the logical network perimeter mechanism and how it establishes a logical boundary....
Describe the purpose of the logical network perimeter mechanism and how it establishes a logical boundary. Further, list the components commonly used to create a logical network perimeter.
Describe the role of HR, Marketing and finance functions within organizations
Describe the role of HR, Marketing and finance functions within organizations
*2-  Describe the role of the communication layer, the network-wide state-management layer, and the network-control application layer...
*2-  Describe the role of the communication layer, the network-wide state-management layer, and the network-control application layer in the SDN controller. *3- Name the four different types of ICMP messages including type and code. What two types of ICMP messages are received at the sending host executing the Traceroute program? *4- Why are different inter-AS and intra-AS protocols used in the internet? Explain your answer.
What role does a Firewall play in an organization. What are the parameters that can be...
What role does a Firewall play in an organization. What are the parameters that can be utilized with Access Control Lists?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT