Question

In: Computer Science

Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network...

  • Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network - including a specific focus on how each helps protect the network from being hacked from both inside and outside the network.

Assignment Objectives:

  1. Configure security devices and procedures to counter malicious hacking activities.
  2. Analyze firewall technology and tools for configuring firewalls and routers.
  3. Discuss intrusion detection and prevention systems and Web-filtering technology.
  4. Explain the purpose of honeypots.

500 words or more, please.

Solutions

Expert Solution

Solution)

The router is a device belong to network. The main goal of this router is passing packets in between the computing of the network after that it will helps to carry out the function of the traffic directing on the internet. The router will attaching 2 or more data lines from the different or various types of network. The router belongs to both software as well as hardware, recent days more companies produces security oriented routers. The router is carrying entire security of the local network, the router holding different types of security functions such as firewall, VPN handling and few other functions. The network address translation done by routers and also stateful packet inspection is also done by routers.

FIREWALL:

Firewall is like a bridge in middle of security policy and also network. Firewall is so famous on internet and the firewall protects the network from unauthorized accesses, The firewall could be used in each device on the network

DMz:

DMz will saparates the lan from various doubtful networks, it was the physical network and also it will give security for network, cause it will restricts the access from the unauthorized or access from hackers directly.

1)IDPS:

It will used in both technologies such as ips and also ids , The ids using for automate detection process of the instructions, the ips is useful to reduce of preventing the incidents.

2)HONEYPOTS:

it will used for alleviate risks and complications in computer network, and it will be provides the prevention, detection and also provide responses. It was good tool to find details belongs to hackers or attackers.

3)The technology of the security protect against entire spiteful files, the firewall protects the network from unauthorized accesses.

4) The firewall carry protection to the router handles and computer the traffic sending to the internet protocol (IP) address.

I HOPE THIS ANSWER WILL HELP YOU PLEASE DO UP VOTE IT MEANS A LOT TO ME THANK YOU.


Related Solutions

A ping fails when performed from router R1 to directly connected router R2. The network administrator...
A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. What is CDP protocol? Why would the network administrator issue this command if the ping failed between the two routers? You have been hired at AABC Inc. to help with an important network project. The network administrator has given you the internal IP address of 192.168.10.0/24 that need to have access to the corporate server...
What happens when a router receives a packet for a network that isn't listed in the...
What happens when a router receives a packet for a network that isn't listed in the routing table? Select one: a. The router will use RIP to inform the host the packet is undeliverable. b. The router sends the packet to the next available router. c. The packet is held until routing table is updated with the required address. d. The packet will be discarded. Each input port of a router has a local copy of the router's forwarding table....
You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  
What role does a firewall play in a honey pot design?
What role does a firewall play in a honey pot design?
What role does a Firewall play in an organization. What are the parameters that can be...
What role does a Firewall play in an organization. What are the parameters that can be utilized with Access Control Lists?
Describe the role of HR, Marketing and finance functions within organizations
Describe the role of HR, Marketing and finance functions within organizations
Suppose nodes A and B are each behind their own NAT firewall (9.7 Network Address Translation)....
Suppose nodes A and B are each behind their own NAT firewall (9.7 Network Address Translation). A ──── NAT_A ──── Internet ──── NAT_B ──── B A and B attempt to connect to one another simultaneously, using TCP. A sends to the public IPv4 address of NAT_B, and vice-versa for B. Assume that neither NAT_A nor NAT_B changes the port numbers in outgoing packets, at least for the packets involved in this connection attempt. Show that the connection succeeds. (Note that,...
Discuss the role of finance in business. What is the purpose of financial management? Describe the...
Discuss the role of finance in business. What is the purpose of financial management? Describe the kinds of activities that financial management involves. What kind of tools do financial managers leverage to access and/or monitor the health and performance of a business? Have you used any of these tools? If so, share your experience.
Consider a router with the: IP address 192.168.1.254/26 Subnet mask: 255.255.255.192 Network Address: 192.168.1.192 Write the...
Consider a router with the: IP address 192.168.1.254/26 Subnet mask: 255.255.255.192 Network Address: 192.168.1.192 Write the relevant DHCP subnet configuration text for this network where the first 50 addresses will be dynamically allocated to hosts.
Describe the role of scenario analysis within the discipline of risk management. (10)
Describe the role of scenario analysis within the discipline of risk management. (10)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT