Question

In: Operations Management

Discuss the differences between the use of ACLs versus the use of firewalls for network security....

  1. Discuss the differences between the use of ACLs versus the use of firewalls for network security. In what situations would the use of ACLs be an advantage over using a hardware firewall?
  1. Discuss the differences between an IDS and an IPS. Discuss examples of organizations who might want to implement an IPS over an IDS.

Solutions

Expert Solution

Discuss the differences between the use of ACLs versus the use of firewalls for network security. In what situations would the use of ACLs be an advantage over using a hardware firewall?

Firewalls

  • Firewalls are responsible for blocking the incoming traffic from the attackers based on some protocols or IP addresses
  • Purpose of firewall

1.      The main purpose of firewall is to examine and analyse the incoming packets and make decisions about them.

ACL

  • ACL is Access Control List.
  • An access control list is a table which informs the operating system of the computer which user has an access rights to use the computer system.
  • It is a table with several entries describing each system user with their access privileges.
  • Purpose of ACL

1.      It filters the traffic on an interface

2.      It can distribute list to filter routing updates

3.      It can identify interesting traffic

4.      It can use policy based routing for taking the routing decisions.

Explanation:

Firewall

  • Firewall detects the blocked network traffic and maintains the log details.
  • Firewalls are responsible for blocking the incoming traffic from the attackers based on some protocols or IP addresses.
  • Firewalls are used as a network security device which monitors the traffic of the network and blocks or allows the traffic based on some predefined rules.
  • There are mainly 2 types of firewalls

1.      Host based firewall- This type of firewall is installed on the individual server of the system.

2.      Network based firewall- It is installed into the cloud infrastructure which acts as a virtual firewall service

  • Thus, a firewall acts as a "gatekeeper" system which protects the computer network and other intranets of a company by providing a filter and safe transfer point for accessing the Internet and other networks.

Difference between ACL and Firewall.

  • ACL is Access Control List, used for several purposes as filtering the packets, distributing list for filter routing updates, for identifying the upcoming packets etc.
  • Access control list is used to identify the packets and allow or deny a packet to pass through an interface.
  • A Firewall is a device whose purpose is to analyse the data traffic as a part of a network and based on this analysis, it decides which packets are allowed to pass through the network and which packets are to be denied.
  • A Firewall is designed for a specific purpose whereas an access control list(ACL) may have more than one purposes.
  • ACL checks the packets without knowing about its route of origination;. It simply analysis the packets without any idea of where it has come from. Therefore, ACL performs stateless inspection.
  • Firewalls performs stateful inspection in a way that it checks the type of the packet and also the route of packet origination.

Discuss the differences between an IDS and an IPS. Discuss two examples of organizations that might want to implement an IPS over an IDS.

IPS is an abbreviation for intrusion detection system which is meant to inspect the traffic flow in a network and thus block any kind of malicious traffic while on the other and hand IDS which is an abbreviation for intrusion detection system is meant to detect malicious traffic in a network. IPS can be used in large organization while on the hand IDS is meant for small organizations that have a small network


Related Solutions

What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss the differences and similarities between a peer-to peer network and a client server network.
Discuss the differences and similarities between a peer-to peer network and a client server network.
Focus on one of these network security solutions (e.g. VPN, firewalls, proxy server, IDS, etc.) and...
Focus on one of these network security solutions (e.g. VPN, firewalls, proxy server, IDS, etc.) and explain how it works in protecting against specific network attacks (e.g. DoS, floodings, intrusions, poisoning , jijacking, etc)
Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT...
Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT ARE FIREWALL ENHANCEMENTS? 2.WHAT CONSTITUTES GOOD FIREWALL RULES? Enumeration ENUMERATE WINDOWS OS TARGETS AND SERVICES?
In a gene regulatory network, describe the differences between: a) Inducible versus Repressible control systems b)...
In a gene regulatory network, describe the differences between: a) Inducible versus Repressible control systems b) Up and Down regulation
Discuss network security in a business ethics.
Discuss network security in a business ethics.
State and Discuss at least two differences between conducting business domestically versus internationally.
State and Discuss at least two differences between conducting business domestically versus internationally.
Discuss the fundamental differences between the Classical and Keynesian schools of macroeconomics. Use these differences to...
Discuss the fundamental differences between the Classical and Keynesian schools of macroeconomics. Use these differences to motivate a discussion of how inflationary and recessionary gaps can be eliminated through the use of discretionary fiscal policy. Use a graphical analysis and conclude by considering the long-run ramifications of adopting a fiscal budget that is sensitive to movements in the business cycle.
What is the main differences between Packet Switch Network & Circuit Switch Network?
What is the main differences between Packet Switch Network & Circuit Switch Network?
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b-...
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b- Explain the role of packet sniffing and protocol analyzers as used in intrusion detection systems c-List and specifically describe the 802.x Ethernet frame header fields that would be important to Network Forensic analysis d- List and specifically describe the 802.x Wireless Ethernet frame header fields that would be important to Network Forensic analysis
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT