Explain the main functions of firewall in network security

Assignment Help Computer Networking
Reference no: EM132297082

Scenario

TIA Software company is global IT company that provides all IT relate services across the globe. TIA is expanding its business and as a consequence, they want to establish a new office at Auckland for their business needs in the Trans-Tasman region.

As the business is growing management has decided to upgrade the peer to peer networks using the internet with their global branches. In the Auckland branch office there are three floors which are connected to the main chassis switch. There is an email and file server which are directly connected to chassis switch in Auckland office, all the computers working fine locally but there is a requirement to connect the local office network to the existing global TIA software branch offices.

As a network administrator, your role is to connect the local Auckland network to the global TIA network using the internet. Assume that your Auckland local network is using 192.168.10.0/24 IP address block. After interconnecting local Auckland network with global branches, TIA Software Company is facing following problems.

a) The server is not responding very often.

b) Some files from share resources are corrupted.

c) Email services, as well as network resources, are running on the server with limited access

Being a network administrator you have to identify the problems and provide necessary solutions/recommendations for various issues by performing the following tasks:

Note: You have to write down the appropriate report after performing each task.

Question -01:
Install and configure the network vulnerability scanning tools (Nmap) in your network and check the vulnerabilities in your network against hackers. Use a network where the vulnerabilities are prominent.

Question-02:
As a network administrator, you have to protect network users and computers. Demonstrate how you would protect your network with the following tasks.
a) Block all the computers from the web access.
b) Create the web access security policy for the network only allowing a single host having IP address (192.168.10.101) and blocking all network hosts to access the internet from port 80 and /or 8080.
c) Apply rules for Windows services and applications.
d) Apply important program with conditions.
e) Block all the remote users to access the internal networks.

Question-03
Analyse the scenario of TIA Software company and create your own network security policies to protect network users and computers from hackers.

Question-04
Evaluate the network vulnerability concerns and weakness in your network (used in Question-01) after generation of vulnerability report of software by using NMAP and provide the counter measures for identified vulnerabilities.

Question-05
Perform the following activities at NMAP using command line tools:
a) Scan open ports.
b) Perform OS fingerprinting.
c) Ping Scan.
d) TCP ports scan.
e) UDP ports scan.

Question-06
Identify and analyse network vulnerabilities by using NESSUS scanner tools.
Your reports should include following analysis:
a) Basic Network scanning.
b) Ntstat port scanning.
c) Vulnerability mapping.
d) Plugins.
e) Policies.

Question-07
a) Analyze how intruder detection system(IDS) can resolve security issues in a computer network. different kinds of scams and frauds on online transaction over network or on Internet. Provide suitable solutions for each of these attacks to protect your system.
b) Install and configure the intruder detection system(IDS), SNORT in your network for ensuring network protection from hackers. Explain different configuration modes of SNORT in details.

Question-08
a) Analyze and explain foot printing in network security.
b) Evaluate hacker's foot print and their presence into network by using network vulnerability tools.

Question-09
a) Explain the main functions of firewall in network security. Analyze different kinds of firewall in brief.
b) Evaluate and explain the selection criteria of a next generation firewall in details.

Question-10
a) Evaluate the common network security problems and their solutions
b) Analyze and explain why network security is crucial for any business organization.

Reference no: EM132297082

Questions Cloud

Homicide rates in the peircetown : Homicide rates in the Peircetown, Pennsylvania are quite high, and seem to be increasing at a rate that is worrisome.
The industry and the external environment of this firm : The Industry and the external environment of this firm. Describe the Industry of this firm including the NAICS code.
Return on investment by distribution channel : What is the profitability level and return on investment by distribution channel, both under the current and the recommended allocations?
Organization demonstrate corporate social responsibility : How can an organization demonstrate corporate social responsibility? give three examples of organizations that demonstrate CSR.
Explain the main functions of firewall in network security : Explain the main functions of firewall in network security. Analyze different kinds of firewall in brief - Evaluate and explain the selection criteria
Dimensions of setting up-facilitating virtual interaction : Virtual groups often require multiple leaders because of the added dimensions of setting up and facilitating virtual interaction,
Discuss any five key barriers to organisational learning : Discuss any five key barriers to organisational learning in organisations in your home country - Explain in detail, any four (4) strategies that
Identified nine indications of employee disengagement : A regular Gallup meta-analysis identified nine indications of employee disengagement. what would have to change in order to change the culture?
Calculate the average growth of states : Calculate the average growth of states over the duration 2013-14, 2014-15 and 2015-16 by taking the mean of the row '(% Growth over previous year

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd