StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Technology Firewalls and VPN - Coursework Example

Cite this document
Summary
In organization, like banks, they tend to make use of computer technology to try and improve areas that might need a lot of work. They therefore try and make their system secure so that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Security Technology Firewalls and VPN
Read Text Preview

Extract of sample "Security Technology Firewalls and VPN"

Download file to see previous pages

In my research, i came about Comodo internet security, pc tools firewall plus free edition and zonealarm free firewall that are the best firewalls to be used at present because they are very light, cheap, easy to maintain as some of them like comodo has combined its antivirus program with firewall pro hence free security program for everyone. A virtual private network (VPN) spreads secluded network across a public network, for instance the internet. It makes telecommunication possible, practical and secure (Stewart p. 87). Extranets are said to be border networks quietly similar to DMZ because resources are accessed by outside entities.

On the other hand, Stewart (p. 87) adds that an extranet is not open for free usage but by specific sets of people. This, however states that a VPN configuration is necessary to get access to the extranet and therefore with this, extranets are both possible and practical. There might be factors one has to consider for both the internal and external firewalls to allow a remote user to access an internal machine from the internet using Timbuktu as in this case shown above.One should be able to use a router that can handle inbound a well as outbound packet filtering on each interface.

You can create a default deny to reject packets,then deny inbound traffic to come f internal address while t outer does not.You can also deny all traffic with invalid addresses as well as all traffic with source routes. Again,deny all ICMP traffic over good size and lastly, reassemble fragments into entire packets. In this network architecture, it is also easy to create a DMZ just between the two firewalls. It will clearly show that the outside world can go through layers therefore easier to hit the DMZ and presumably what is there is at a lower risk.

Multiple layers of firewalls are more secure even though it seems to be very difficult

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Technology Firewalls and VPN Coursework”, n.d.)
Security Technology Firewalls and VPN Coursework. Retrieved from https://studentshare.org/information-technology/1623249-security-technology-firewalls-and-vpn
(Security Technology Firewalls and VPN Coursework)
Security Technology Firewalls and VPN Coursework. https://studentshare.org/information-technology/1623249-security-technology-firewalls-and-vpn.
“Security Technology Firewalls and VPN Coursework”, n.d. https://studentshare.org/information-technology/1623249-security-technology-firewalls-and-vpn.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Technology Firewalls and VPN

Firewall Architectures and Techniques A study on the high speed network security they provide

(Technology Investigation Center, 2002) There are four main generations of firewall architectures: packet filters, circuit level firewalls, application layer firewalls and dynamic packet filters.... Typical project plan for firewall architectures and techniques includes:List of services delivered over the Internet to state agencies List of desirable firewall features List of firewall products and their ability to be configured to provide desired features Process documentation, test procedures, results and analysis Glossary of terms and acronyms Index of Reference Materials Web accessible repository of information suitable for the public Communication of results to interested parties Identification of needs for further investigation of firewalls or related issues (Technology Investigation Center, 2002) 2....
2 Pages (500 words) Essay

Rapid Freight Converged Network Security

IPSec vpn scrambles traffic from the phone and safely connects to the corporate network without fear of infiltration.... Secure Socket Layer vpn (SSL vpn) ensures that users are logging in from healthy computers when accessing the network remotely.... xternal threats are easily kept at bay through the implementation of firewalls.... Notwithstanding, firewalls are not perfect and should not be used solely (Stewart, 2010)....
2 Pages (500 words) Case Study

The Solution of VPN Connection

Maskat (2011) dictates that although firewalls and other security cautions were taken, they were neither extensive nor... This paper will discuss the solution of ISP, vpn connection, and utilization of It was evident that IPsecs play a huge role in ensuring encryption within two routers.... According to Sommer (2012), vpn connection should consist of a RSA token in which the pin code must be accessed.... After the vpn connection has been established, the user can access all the software and applications of a company....
6 Pages (1500 words) Case Study

Modern Day Attacks against Firewalls and VPNs

The security issues surrounding VPNs are cracking of offline passwords, deficiency of account lockout, poor default formation, and vpn thumbprint among others (Hills, 2005).... This essay "Modern Day Attacks against firewalls and VPNs" intends to explain and discuss modern-day attacks against firewalls and VPNs.... nbsp;This essay intends to explain the modern-day attacks against firewalls and VPNs by explaining the concepts of these two information technology tools....
8 Pages (2000 words) Essay

Network Security Fundamentals

The improving technology has led to massive investments in financial services that have seen many people accessing organizations' services at their convenient places.... Many of credit card transactions need verification by the users to reduce high crime rate thus with the case of the medium ed start-up company, the Chief Information security Officer (CISO) should be well equipped to handle a myriad of challenges and security threats posed by using online transactions....
5 Pages (1250 words) Essay

Virtual Private Network

nbsp;The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the vpn and compare their strengths and weakness among others.... The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the vpn and compare their strengths and weakness among others.... The main advantages associated with the use of vpn are its low cost and scalability....
7 Pages (1750 words) Case Study

Data and Computer Communications - The Issue of Security

… The paper "Data and Computer Communications - The Issue of Security" is a delightful example of an assignment on information technology.... The paper "Data and Computer Communications - The Issue of Security" is a delightful example of an assignment on information technology.... It is obvious to expect that the security necessities of a wireless system will include addressing this distress (Curtin, 2005).... Integrity, with reference to data and network security, is the guarantee that information can only be accessed or effect changes by those endorsed to do so....
6 Pages (1500 words) Assignment

System Security and Rise of Internet due to Advancement of Information Technology

This paper "System Security and Rise of the Internet due to Advancement of Information technology" tells that the internet of becoming an important part of human life as it offers a platform for shopping empowers the citizens, enables people to access information, and even makes the government be transparent....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us