Reference no: EM133478199
Firewalls Great and Small -
During the semester we discussed various types of firewalls that were used to protect systems and limit (contain) the flow of information within networks. Among the types of firewalls we discussed where packet filters, application level gateways (proxies), host based software firewalls, embedded firewalls, and distributed firewalls. In later discussions during the semester, we discussed regulation of content, and we mentioned some of restrictions that are put in place by what is commonly referred to as "the great Firewall of china" (though it is important to note that other countries use similar techniques to control network traffic into and out of their countries). In this question, I want to combine what you to discuss the relationship between these different uses of firewalls. In particular, you should:
1. The great firewall of China performs the functions of which of the types of firewalls listed above. Please note that it is not just a single firewall, and not of a single type. So you should list each of the types enumerate above, and for each type tell me if the GFC performs the function of that type of firewall, and briefly why or why not.
2. What are some of the limitations of firewalls deployed for such purposes, and how might those limitations be exploited to bypass the controls provided by the firewall, and how might some of those limitations be "corrected" to restore those controls.