Identify at least two security issues in this setup

Assignment Help Computer Engineering
Reference no: EM133325563

Assignment: If you were a network admin of our CCIA network and you were asked to host an HTTP web server on Windows Server 2008. It is open to the public. Currently, no firewall policy exists to examine any incoming traffic.

Please answer the following questions:

1. Identify at least two security issues in this setup.

2. How to better protect this network? Please design a set of firewall policies in pfSense to protect this network based on your protection plan. For each policy you proposed, please provide detailed information, such as interface name, action, source /destination IP, and source /destination port.

3. How to verify the rule(s) is working as expected?

Reference no: EM133325563

Questions Cloud

Different points of the production process : Different points of the production process. Explain those place a) in general, b) more precisely for regulation at the transcription level
What are the attributes or skills that you believe : what are the attributes or skills that you believe your future employer/graduate program will be most interested in? Where do you have the greatest room
What is your predominant temperament style : According to the work of Thomas, Chess & Birch, what is your predominant temperament style (Easy/Flexible, Slow to Warm/Fearful, or Difficult/Feisty)?
Why does pollan argue that paying more for good quality food : SOC 201 University of Regina Why does Pollan argue that paying more for good quality food will help us eat less
Identify at least two security issues in this setup : Identify at least two security issues in this setup. How to better protect this network? Please design a set of firewall policies in pfSense to protect
Design data modelling using entity relationship diagrams : design Data modelling using Entity Relationship Diagrams and then converting the data model to the database design Create a database to record all the data
Understanding and open to all different ideas and cultures : Understanding and open to all different ideas and cultures, because that's what political ecology is, a bunch of different ideas in one field of research
What would you change to impact better nutrition : HOSP 104 Ivy Tech Community College, Indianapolis discuss your thoughts on the videos. Then, thinking back to MyPlate, choose one food group and propose
Different subtypes, macro and micronutrients : What are the different subtypes, Macro and micronutrients, and their purposes, 6 Essential Nutrients, Carbohydrates, Fats and Lipids, Protein and water

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define internal path length of a tree t to be sum of depths

Define the internal path length, I(T), of a tree T to be the sum of the depths of all the internal nodes in T.

  How the processor architecture supports virtual memory

Explain what effects (positive or negative) the architecture's virtual memory support has on application software.

  There are many property crimes but onlynbsp4 property

there are many property crimes but onlynbsp4 property crimesnbspare listed by the ucr asnbspindex crimes.these are the

  Find which one of the fourteen binary search trees

Find which one of the 14 binary search trees corresponds to each of the 24 possible ordered sequences of 1, 2, 3, 4.

  Described the management organization and technology

this assignment focuses on how hsbc became a victim of the recent subprime mortgage crisis despite having a history of

  Create another rapidminer process that uses decision tree

Create another rapidminer process that uses decision tree to classify the golf dataset.

  How dhs handle situation described in preceding paragraph

Explain how DHS should handle the situation described in the preceding paragraph.How would the DHS assist commercial entities? How would DHS assist government

  Summarize two key information security practices

Summarize two key information security practices you recommend the company implement. Provide supporting examples/research/justification

  Assignments review in online education system

How could you design an information system to support the interaction professor-students in the assignments review in an online education system?

  Critical forensics analysis of iphone

This is a research and development project on a topic related to digital investigation and forensic computer. Critical Forensics Analysis of Iphone

  Write down java-like pseudocode

Write down Java-like pseudocode

  Describe the logical characteristics of each interface

Describe the logical characteristics of each interface between the software product and the users.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd