Explain why a single firewall in this configuration

Assignment Help Other Subject
Reference no: EM132987043 , Length: word count:600

SIT716 COMPUTER NETWORKS AND SECURITY

Learning Outcome 1: You will be required to explain the architecture and operation of computer networks, security attacks, and defensive measures.

Learning Outcome 2: You will be required to explain normal and abnormal behaviour of network protocols.

Learning Outcome 3: You will be required to explain how cybersecurity activity can be identified.

Assessment: Bi-weekly Report

PURPOSE
Short answer questions to assess and reinforce learning of the concepts of Weeks 7-8 by exploring firewalls and VPNs for securing networks, and SNMP and IPFIX for identifying cybersecurity attacks.

TASKS

i. Consider a scenario where you are working for a Small-Medium Enterprise (SME) and business which wishes to improve its security capability by installing a single firewall or router to fully protect both the infrastructure and data stored on-premises and at the location of the online shopping site. Explain why a single firewall in this configuration will not fully secure the network and briefly describe an example of an attack that could succeed.

ii. The SNMP and IPFIX (a modern NetFlow standard) protocols and associated systems provide important telemetry data that can be used to identify potential cybersecurity attacks occurring on a network. Explain the differences between SNMP and IPFIX and give an example of data obtained from these systems (one example each) that might identify an anomaly that could be a sign of an active security attack and explain how such anomalous data could indicate that the identified attack is active.

Attachment:- COMPUTER NETWORKS AND SECURITY.rar

Reference no: EM132987043

Questions Cloud

Future-state goal in contextualizing the conflict : Construct a problem statement that clearly articulates the personnel conflict that has arisen in any organization. Be sure to consider the project scope and fut
Define trustbusting : Define trustbusting. Analyze trustbusting in the home country of your international pen pal.
Ineffective at fixing conflicts between team members : Describe why team retreats are often ineffective at fixing conflicts between team members.
Summarise the rights of the employer : Summarise the rights of the employer and the employee and essential terms and conditions of employment in the Real Estate Award.
Explain why a single firewall in this configuration : Explain why a single firewall in this configuration will not fully secure the network and briefly describe an example of an attack that could succeed
What is value proposition : What is Value Proposition? Describe the value proposition of scooter.
How do allocate overhead to each of two types of surgeries : How do allocate overhead to each of the two types of surgeries for May using single plantwide overhead rate. Health Cooperative is outpatient surgical clinic
Importance of exchange rates to business activities : In aprx 100 words, explain the importance of exchange rates to business activities.
Discuss the importance of a change agent and a guiding team : Discuss the importance of a change agent and a guiding team. What is the purpose of each, and what traits make them successful?

Reviews

Write a Review

Other Subject Questions & Answers

  What dose the video suggest about government and revolution

What dose the video suggest about government and revolution. Dose democracy have a historical inevitability according to the video. Describe in detail

  How the ehr supports technological needs

Applicability to the health care practice setting and workflow support. How the EHR supports technological needs (cloud-based vs. client-server)

  Which facility was more productive

A company that makes kitchen chairs wants to compare productivity at two facilities. At facility #1, six workers produced 240 chairs. At facility #2, four workers produced 210 chairs during the same time period. Which facility was more productive?

  What can warfield be charged with and why

As the men were getting ready to leave the house, local police happened by and noticed the situation. The group of men, including Warfield, fled from the house.

  Explain disadvantages of creating portable learning assets

Analyze two (2) advantages and two (2) disadvantages of creating portable learning assets for an LMS. Research alternatives to Shareable Content Object.

  Identify some of the sources of conflict often experienced

Discuss how these types of problems were handled in your workplace or team-building scenario. Were the methods used correct or incorrect?

  Describe the most common forms of digital crime

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past few decades. Describe most common forms of digital crime

  What two main areas constitute metaphysics

1. What two main areas constitute Metaphysics? 2. Name one theory of knowledge and the thesis is defends.

  Prepare test environment for mail server

COMP 30005 Communication Server Administration - Prepare Test environment for mail server and Discuss issues affecting enterprise mobility

  Paper - corruption of public officials

SUGGESTED TOPIC: Corruption of Public Officials (any matter related to ethics in public administration is acceptable), Begin by selecting a topic to research. The research paper requires a public administration topic selection that focuses on an eth..

  Write a research paper about electronic medical records

Write a research paper about Electronic Medical Records. These skills will be valuable throughout the student's academic studies and business career.

  How will the body of the proposal be organized

What is the subject of this proposal. What is not the subject of this proposal. How will the body of the proposal be organized

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd