Question

In: Computer Science

As you increase the security of your network, you are concerned that the added security measures...

As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain

  1. It can filter packets from a site known to cause DoS attacks.
  2. It can filter packets that have a virus signature.
  3. It can block traffic that should be allowed through.
  4. It can log every packet that is transmitted.

Solutions

Expert Solution

How could a firewall have a negative impact on business from the following list?

  • Where a firewall can be a blessing to the security of the network it can also act as a curse for the organization at the same time if not being monitored closely while it has been implemented in the network.
  • The first and foremost impact on the business of the firewall would be the cost of the firewall which can be very heavy in case of maintenance of the firewall too. It can become tougher to hold on to the firewall without spending a decent amount on it.
  • Another impact that firewall can cause is that it can sometimes also restrict legitimate user due to the unauthorized transmission of the data which is been carried to and from the network. Hence, banning legit users can also be one of the drawbacks of using a firewall.
  • Firewall can also depreciate the performance of the software which can result in minimizing the overall performance of the computer which will constantly affect the RAM and the performance of its functionalities.
  • The firewall does not provide security from sabotage which is one of the major drawbacks of using the device as we already know that most successful attacks that are being carried on are mostly corporated by staying inside the network.

Hence, these are some of the negative impacts on the business and there must be preventive measures to be taken for protecting the organization against such drawbacks.


Related Solutions

29. Question 29 For added security you decide to protect your network by conducting both a...
29. Question 29 For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done? 1 point You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall. Install a single firewall that is capable of conducting both stateless and stateful inspections. Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in...
MYOCARDIAL INFRACTION: You are working for a cardiologist. Your physician is concerned about the increase in...
MYOCARDIAL INFRACTION: You are working for a cardiologist. Your physician is concerned about the increase in the number of the patients having heart attacks. He asks you to design a colorful, creative, and informative brochure on heart attacks using the brochure provided on the following provided. This brochure will be published and placed in the waiting room to provide patients with education about heart attacks.The heart disease Internet sites listed under "On the Web". Complete this activity. Questions: Answers: Questions:...
develop a set of added measures of performance (KPIs) and a set of added measures of...
develop a set of added measures of performance (KPIs) and a set of added measures of performance for either asset impairment or revenue recognition. These KPIs may be based on data not commonly included in financial reporting, may be drawn from either quantitative or qualitative data, and may focus on either diagnostic or predictive analytics.
You have joined a company as a network security analyst. Your CTO came to know you...
You have joined a company as a network security analyst. Your CTO came to know you are a graduate from MIT Melbourne/Sydney and successfully completed a VPN unit. Therefore, you have been asked to develop a security plan for your customers and remote managers for their Internet access to the business. You need to analyse the following cases and recommend the solutions for the question quen-1) You want to assist customers in building trust with your company. Discuss with your...
Define the scope of network security.
Define the scope of network security.
Discuss different security websites or network and security informational sites that you may already monitor and...
Discuss different security websites or network and security informational sites that you may already monitor and why. Limit the discussion to no more than three sites.
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks. Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs ➢ Purpose of the Project ➢ Network overview (ex: connecting PCs,...
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
Discuss network security in a business ethics.
Discuss network security in a business ethics.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT