Question

In: Computer Science

You are an IT company and want to get a travel agency's network design, hardware, software,...

You are an IT company and want to get a travel agency's network design, hardware, software, and security. What’s the difference between IDS and Firewall? What is a promiscuous mode in IDS? What is an in-line mode in IDS? When is appropriate to use one or the other in your network? Specific to a travel agency what firewall & IDS vendors’ such as Palo Alto Networks, Check Point, Cisco, etc., and select product(s) suitable for the travel agency. Justify your selection.

NOTE Please be specific to a travel agency.

Solutions

Expert Solution

Dear Student,

  • A firewall will block the access to your network by screening traffic and deciding which packets should be allowed in.
  • The experts compare it to a security guard deciding who can get clearance.
  • The firewall monitors the ports that connect your network to the Internet and checks data packets before allowing them to pass through.
  • A firewall can accept a packet, drop it -- erasing it from existence -- or deny it, returning it to the sender.

V/S

  • If firewalls are security guards, intrusion detection systems (IDS) are security cameras.
  • An IDS monitors traffic and spots patterns of activity, alerting you if it sees that your network is under attack.
  • Signature detection compares network or system information to attacks already listed in the IDS database.
  • Anomaly detection compares current network traffic to the normal levels of packet size or activity and analyzes the result statistically.
  • If network traffic suddenly shoots up to a high level, for instance, that could indicate a hacking attack.

PROMISCOUS MODE :

  • In a IDS, promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety.
  • This mode of operation is sometimes given to a network snoop server that catch and saves all packets for analysis (for example, for monitoring network usage).
  • In an Ethernet local area network (LAN), promiscuous mode is a mode of operation in which every data packet transmitted can be received and read by a network adapter
  • Promiscuous mode must be supported by each network adapter as well as by the input/output driver in the host operating system. Promiscuous mode is often used to monitor network activity.

IN-LINE MODE :

  • In inline mode, traffic passes into one of the appliance’s Ethernet ports and out of the other.
  • When two sites with inline appliances communicate, every TCP connection in between them is accelerated. All other traffic is passed through transparently, as if the appliance were not there.
  • Configuration is lowered with inline mode, because your WAN router need not be aware of the appliance’s existence.
  • Depending upon the configuration, inline mode’s link-down propagation can affect management access to the appliance if a link goes down.
  • Inline mode is most effective when applied to all traffic flowing into and out of a site, but it can be used for only some of the site’s traffic.

(BASED ON THIS THEORY, The Travel Agency can select the appropriate Systems as per the requirement )

Hope This Helps.

All The Best


Related Solutions

You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. DMZ Architecture: What is your DMZ architecture? What devices and their function are included? How are DMZ devices connected? How are you planning to provide security to protect the DMZ and at the same time maintaining friendly access to customers?
You are an IT company and want to get a travel agency's network design, hardware, software,...
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
You are an IT company and want to get a travel agency's network design, hardware, software, and security.
You are an IT company and want to get a travel agency's network design, hardware, software, and security. Submit a list of all e-Commerce applications required in the enterprise network. Make sure to include a description of each application.
You are an IT company and want to get a daycare's network design, hardware, software, and...
You are an IT company and want to get a daycare's network design, hardware, software, and security. Project resources allocation. List all types of resources (e.g. human and non-human) you will use them in the enterprise network project. How are you planning to use those resources cost-effectively?
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a networking problem from the internet and design the networking solution. Use lucidchart or vision.
Hardware and Network Plan Create a network for a company that sells shoes. Describe the hardware...
Hardware and Network Plan Create a network for a company that sells shoes. Describe the hardware needed and the size of the network (PAN, LAN, WAN) and make a flow chart or mind map of the network. The description should be at least 500 words. The flow chart or mind map should have at least 12 boxes, each box should be labeled and the flow noted. The main thing I need help with is the flow chart or the mind...
Discussion: Network Standards Networks today span the globe. Hardware and software manufactured by different companies in...
Discussion: Network Standards Networks today span the globe. Hardware and software manufactured by different companies in different countries need to be interchangeable and able to work together. A network interface card needs to be able to interface with any network anywhere in the world. This consistency is established through standards. Important international standards-making bodies for networks include: International Organization for Standardization (ISO), International Telecommunications Union (ITU), Institute of Electrical and Electronics Engineers (IEEE), Internet Engineering Task Force (IETF), and World...
Network Design proposal for a University Problem: Suppose you are asked to design of a network...
Network Design proposal for a University Problem: Suppose you are asked to design of a network infrastructure for a university. The university has 7 departments namely, IT, Finance, HR, Management, Faculty, students and R&D. The university also has an ADSL internet connection which is shared for the different departments. It is required that all the departments should have intercommunication. The R&D department should not have access to the internet. Each of the department contain 50-100 users. Explain your design giving...
To what end have billions of dollars have been spent on computer hardware, software, network communications,...
To what end have billions of dollars have been spent on computer hardware, software, network communications, and all the other requirements of having world-class technology. Has the money spent on technology allowed businesses to become more profitable? Has the implementation of information technology led to a sustainable competitive advantage?
To what end have billions of dollars have been spent on computer hardware, software, network communications,...
To what end have billions of dollars have been spent on computer hardware, software, network communications, and all the other requirements of having world-class technology. Has the money spent on technology allowed businesses to become more profitable? Has the implementation of information technology led to a sustainable competitive advantage? *300 words
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT