Question

In: Computer Science

After an initial analysis of your client’s potential security threats, the management has agreed to secure...

After an initial analysis of your client’s potential security threats, the management has agreed to secure its remote access to internal resources by rolling out a VPN and firewall solution. The client’s management team has asked that you present two proposals: an entry level and high end. For the entry level solution, feel free to look into open source technologies. For the premium recommendations, look into products from Cisco or F5. Please remember that the target audience is a non-technical management group, so use language they would understand. Your proposal should include the following: VPN Proposal 2: Technology Name: Description: Advantages/Disadvantages: Estimated Cost: Firewall Proposal 2: Technology Name: Description: Advantages/Disadvantages: Estimated Cost:

Solutions

Expert Solution

The firewall is the PC security gadget that can work at the product or the equipment level to forestall undesirable outside access to the PC framework , It permits you to control the movement , The great firewall keeps awful Folks from softening up and it shields classified information from being conveyed .

The firewall is a standout amongst the best types of insurance created against the programmers working on the Web , Firewalls utilize an assortment of methods to secure against the assaults, for example, intermediary servers .

The firewall controls the system access to at least one PCs , The Web is a vast system that incorporates your PC , The firewall ensures your PC by going about as an entryway through which both every one of the information must pass , It hinders certain sorts of movement .

The firewalls veil your IP address and point of confinement movement sorts , The outside PCs speak with them , rather , as far as possible the associations with the trusted systems just .

The firewall

The firewall

The firewall is a limit or a divider to shield the interlopers from assaulting the system , It is system gadget that is in the middle of a private system and the web , It is designed to investigate the system movement that goes between the system and the web .

At the point when your private system is associated with the web , It permits anybody to get to the data from the outside sources , And it permit the outer clients to enter the private system and take the data from the system , You ought to have the firewalls to ensure them .

There are predominantly two sorts of firewalls which are the product firewalls and the equipment firewalls , The equipment firewall or the switch is associated with the Web and your system , The switches are separate gadgets that ensure your whole system .

The equipment firewalls is speed , They are utilized for the speedier reaction times , and they handle more activity burdens , The firewall is less inclined for the assaults , This thus lessens the security chance , The equipment firewalls have improved security controls .

The equipment firewall gives more entire insurance than the product firewalls , The equipment firewall can ensure the system of PCs .

Since they don't keep running on your framework , The equipment firewalls don't impact framework execution , They don't rely on upon your working framework and programming applications .

The product firewalls are less expensive , They are perfect for individual or home utilize , They can be arranged or reconfigured effortlessly .

The individual framework's working framework based firewall can give an awesome security , however a system based firewall, for example, the switch can ensure numerous frameworks , The firewall will help shield your PC from outside programmer assaults .

Weakness of firewalls

A committed equipment firewall costs more than a product firewall , It is hard to introduce , and update , It consumes up physical room , and includes wiring .

The equipment firewalls have a tendency to be more costly than the product firewalls , When the equipment firewalls can not keep running on the PC, they can be a testing to arrange .

The product firewalls takes up framework assets , It is hard to evacuate or un-introduce the firewall , The equipment firewall facilitates this weight .

Designing and keeping up the firewall can be a troublesome , The system firewall can loan less security , urging them not to keep up security at the machine level .

The firewalls can be hard to utilize effectively particularly for the new clients , They may hinder the clients from playing out specific activities on the Web until the firewall arranged accurately .


Related Solutions

1. Interpreting Client Needs Determine your client’s needs and potential threats and attacks associated with their...
1. Interpreting Client Needs Determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Consider the following regarding how companies protect against external threats based on the scenario information: What is the value of secure communications to the company? Are there any international transactions that the company produces? Are there governmental restrictions about secure communications to consider? What external threats might be present now and in the immediate future? What are the “modernization”...
portfolio management security analysis
You read in BusinessWeek that a panel of economists has estimated that the long-run real growth rate of the U.S. economy over the next five-year period will average 7 percent. In addition, a bank newsletter estimates that the average annual rate of inflation during this five-year period will be about 6 percent. What nominal rate of return would you expect on U.S. government T-bills during this period? Round your answer to two decimal places.  %What would your required rate of return be on...
SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis of Google’s Cloud Security.
SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis of Google’s Cloud Security.
What security threats do organisations face in their e-business operations? What are the potential consequences of...
What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?
What security threats do organisations face in their e-business operations? What are the potential consequences of...
What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?
What are factors in HIT that precipitate security threats and how will you, in your practice,...
What are factors in HIT that precipitate security threats and how will you, in your practice, protect your patients from these same threats?
Identifies how a client’s biases, preconceptions and assumptions influenced your portfolio management strategy
Identifies how a client’s biases, preconceptions and assumptions influenced your portfolio management strategy
what is the risk management? use SWOT Analysis (Strengths, Weaknesses, Opportunities and Threats)for the hr system...
what is the risk management? use SWOT Analysis (Strengths, Weaknesses, Opportunities and Threats)for the hr system in the companies 1. Definition of risk management? 2. use SWOT Analysis for hr system?
Topic: Acct & Financial Analysis Share your thoughts on the threats facing modern organizations and the...
Topic: Acct & Financial Analysis Share your thoughts on the threats facing modern organizations and the future of financial regulations.
Identifying strategic issues occurs after conducting the SWOT (strengths, weaknesses, opportunities, and threats) analysis. Although planners...
Identifying strategic issues occurs after conducting the SWOT (strengths, weaknesses, opportunities, and threats) analysis. Although planners will generally all be looking at the same information (from the SWOT), there are differing opinions on which issues classify as being strategic in nature. Within the specific context of this process, what are some techniques that you would implement in more effectively identifying strategic issues and coming to consensus on how to approach them? Are there any techniques that should be avoided? Why,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT