Describe the different types of firewalls

Assignment Help Operating System
Reference no: EM131577331

Assignment Description: Firewalls and Intrusion Detection and Prevention Systems

Both firewalls and intrusion detection and prevention systems are used extensively in network security, including protecting the network perimeter. They will be configured based on where they are located and the security requirements within that security zone.

Write a 3-4 page paper in which you:

1. Describe the different types of firewalls.

2. Analyze how the security requirements within different security zones will impact the firewall configurations.

3. Describe the purpose of a intrusion detection system, intrusion prevention system, and intrusion detection and prevention system.

4. Assess the effectiveness of these devices in protecting the perimeter of the network. Include an explanation of what they do protect and what they do not protect.

5. Examine the standards and protocols used in the development of network perimeter devices, and address if more or less standardization is needed, and how that will improve the security of network perimeter devices as a whole.

Parameters:

The paper must be 3-4 pages and be in accordance with APA 6th edition. The 3-4 page requirement is for the main body of the paper; this does not include the cover page and the list of references. You must include at least 3 references in your paper.

Reference no: EM131577331

Questions Cloud

Population impact the way you approach that population : How may your personal bias about a specific population impact the way you approach that population. What can you do to mitigate the effects
Identify different themes that emerged from your analysis : You prepared essay that identified different themes that emerged from your analysis of peer-reviewed journal articles and annotations written for those article.
The practice exam provide the opportunity to review practice : Based on your program, select either "Addiction Exam" or "Professional Exam." After completing the exam a completion document will be generated.
Define the enforcement of drug laws in the united states : Define the enforcement of drug laws in the United States
Describe the different types of firewalls : Describe the different types of firewalls. Analyze how the security requirements within different security zones will impact the firewall configurations.
Analyse the criminal liability of gary and giorgio : Analyse the criminal liability of Gary and Giorgio, Gary and Giorgio decide to go out and see if there is anyone on the street
Think about the processes of forming a judgment : Think about the processes of forming a judgment and persuading others in your professional environment.
Marginal costs of producing pizzas : An increase in the price of the inputs, increases the marginal costs of producing pizzas, which decreases supply and increases the market price.
Examine the different types of technologies applied : Examine the different types of technologies applied to LensCrafters' service operations and evaluate how the technologies strengthen the value chain.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd