Question

In: Computer Science

Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT...

Firewalls & Network Security course

FIREWALL BASICS

a long and comprehensive explanation by typing please

1.WHAT ARE FIREWALL ENHANCEMENTS?

2.WHAT CONSTITUTES GOOD FIREWALL RULES?

Enumeration

ENUMERATE WINDOWS OS TARGETS AND SERVICES?

Solutions

Expert Solution

1. A firewall is a system that is designed to prevent anauthorized access from entering a priviate network by filtering the information that comes in from the internet. A firewall blocks unwanted traffic and permits wanted traffic, firewall purpose is to create safety barrier between a private network and the public internet. The Firewalll Enhancements are:

  • Application Control
  • Device Control
  • Antivirus
  • Intrusion Prevention

2. A firewall works by filtering the incoming networ data and determines by its rules if it is allowed to enter a network, these rules are also known as access control list. these rules customized and are determined by the neetwork administrator. the administrator decide not only what can enter a network but also what can leave a network. these rules either allow or denies permission.

Permission IP Adress Protocol Destination Port

accroding to the above table set by network administrator, according to the rules in firewall access control list. it shows list of IP Address that have been allowed or denied by this firewall, traffic from some IP Adress are allowed to enter this network. firewall rule don't just make rules based in IP Adresses, but they can also make rules based domain names, protocols, programs, ports and keywords.

The Good Firewall Rules are:

  • LAN to WAN access
  • WAN to LAN Access
  • LAN to LAN Access

3. Enumeration is the process to discover potential attack vectors in the system. it is used to gather in following ways:

  • Hostnames
  • Networks shares and services
  • Application and banners
  • usernames and groupnames

Related Solutions

Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES...
Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES AND EXPLAIN WAYS TO FIX THEM 2.EXPLAIN WHAT RED HAT IS OS. TO LINUX WHAT DOES RED HAT DO?
Discuss the differences between the use of ACLs versus the use of firewalls for network security....
Discuss the differences between the use of ACLs versus the use of firewalls for network security. In what situations would the use of ACLs be an advantage over using a hardware firewall? Discuss the differences between an IDS and an IPS. Discuss examples of organizations who might want to implement an IPS over an IDS.
1. What roles does a firewall perform? 2.Most enterprise networks use both host firewalls, such as...
1. What roles does a firewall perform? 2.Most enterprise networks use both host firewalls, such as Windows Firewall and network firewalls. Why would you want to use both? 3.Which tool should you use to modify firewall rules on a Windows server? 4.In the lab, you enabled a firewall rule that allowed users on an external network to connect to a Web server using HTTP. Which port is used for these connections? 5.Can a host-based firewall help defend against malware and...
Focus on one of these network security solutions (e.g. VPN, firewalls, proxy server, IDS, etc.) and...
Focus on one of these network security solutions (e.g. VPN, firewalls, proxy server, IDS, etc.) and explain how it works in protecting against specific network attacks (e.g. DoS, floodings, intrusions, poisoning , jijacking, etc)
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way...
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way ANOVA; assumptions, when to use it, and its applications? Q2. what is the concept of Parametric vs NonParametric
What network security specialist do to fight hackers? I need all the information and clear explanation
What network security specialist do to fight hackers? I need all the information and clear explanation
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
What firewall systems include any of these features: Network Address Translation (NAT), a proxy server or...
What firewall systems include any of these features: Network Address Translation (NAT), a proxy server or a bastion host? How would the function of the firewall be enhanced by any of them? What are the specific limitations of security technology? Are there ways of overcoming those limitations? How can the review of security audits and logs help in identifying those limitations, eliminating them and generally help in improving computer security?
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
WAN Technology b. Listing and explanation on all security techniques covered in this course (6 marks)...
WAN Technology b. Listing and explanation on all security techniques covered in this course c. Discussion on how each of them is associated to the network security goals.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT