Question

In: Computer Science

Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT...

Firewalls & Network Security course

FIREWALL BASICS

a long and comprehensive explanation by typing please

1.WHAT ARE FIREWALL ENHANCEMENTS?

2.WHAT CONSTITUTES GOOD FIREWALL RULES?

Enumeration

ENUMERATE WINDOWS OS TARGETS AND SERVICES?

Solutions

Expert Solution

1. A firewall is a system that is designed to prevent anauthorized access from entering a priviate network by filtering the information that comes in from the internet. A firewall blocks unwanted traffic and permits wanted traffic, firewall purpose is to create safety barrier between a private network and the public internet. The Firewalll Enhancements are:

  • Application Control
  • Device Control
  • Antivirus
  • Intrusion Prevention

2. A firewall works by filtering the incoming networ data and determines by its rules if it is allowed to enter a network, these rules are also known as access control list. these rules customized and are determined by the neetwork administrator. the administrator decide not only what can enter a network but also what can leave a network. these rules either allow or denies permission.

Permission IP Adress Protocol Destination Port

accroding to the above table set by network administrator, according to the rules in firewall access control list. it shows list of IP Address that have been allowed or denied by this firewall, traffic from some IP Adress are allowed to enter this network. firewall rule don't just make rules based in IP Adresses, but they can also make rules based domain names, protocols, programs, ports and keywords.

The Good Firewall Rules are:

  • LAN to WAN access
  • WAN to LAN Access
  • LAN to LAN Access

3. Enumeration is the process to discover potential attack vectors in the system. it is used to gather in following ways:

  • Hostnames
  • Networks shares and services
  • Application and banners
  • usernames and groupnames

Related Solutions

Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES...
Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES AND EXPLAIN WAYS TO FIX THEM 2.EXPLAIN WHAT RED HAT IS OS. TO LINUX WHAT DOES RED HAT DO?
1. What roles does a firewall perform? 2.Most enterprise networks use both host firewalls, such as...
1. What roles does a firewall perform? 2.Most enterprise networks use both host firewalls, such as Windows Firewall and network firewalls. Why would you want to use both? 3.Which tool should you use to modify firewall rules on a Windows server? 4.In the lab, you enabled a firewall rule that allowed users on an external network to connect to a Web server using HTTP. Which port is used for these connections? 5.Can a host-based firewall help defend against malware and...
Focus on one of these network security solutions (e.g. VPN, firewalls, proxy server, IDS, etc.) and...
Focus on one of these network security solutions (e.g. VPN, firewalls, proxy server, IDS, etc.) and explain how it works in protecting against specific network attacks (e.g. DoS, floodings, intrusions, poisoning , jijacking, etc)
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way...
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way ANOVA; assumptions, when to use it, and its applications? Q2. what is the concept of Parametric vs NonParametric
What network security specialist do to fight hackers? I need all the information and clear explanation
What network security specialist do to fight hackers? I need all the information and clear explanation
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
WAN Technology b. Listing and explanation on all security techniques covered in this course (6 marks)...
WAN Technology b. Listing and explanation on all security techniques covered in this course c. Discussion on how each of them is associated to the network security goals.
What are the disadvantages of network MACsec security? I want to know disadvantages and network drawbacks...
What are the disadvantages of network MACsec security? I want to know disadvantages and network drawbacks of MACsec(IEEE 802.1AE). What is there?
1. Elaborate the challenges of managing a network environment. Example: Network security Performance management Non-centralized network...
1. Elaborate the challenges of managing a network environment. Example: Network security Performance management Non-centralized network management Traffic monitoring
Please give a good explanation and a comprehensive answer. Where in the asphalt layer, would you...
Please give a good explanation and a comprehensive answer. Where in the asphalt layer, would you expect to find a tension crack forming(initiating) and why?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT