What are the two limitations of static packet filtering

Assignment Help Computer Networking
Reference no: EM13337591

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

Topic 5 - Firewalls

Question 1

(a) what are the two limitations of static packet filtering? Explain why each limitation is bad.

(b) A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver, https://www.csu.edu.au. The firm also has a finance server that should only be accessible to people in the finance department. The server and the finance departments are all on the internal subnet 137.13.2.4. The firm has a single large site. How would you implement this policy? Create both a firewall architecture and ACLs for the border firewall for both internal and external connection-opening attempts.

Topic 6 - Host hardening

Question 2

(a) Why do you think companies often fail to harden their servers adequately? Justify your explanation.

(b) In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can only work when they have an Internet connection. Based on what you learned in this topic (Chapter 7), discuss security implications for netbooks, both pros and cons.

Topic 7 - Data protection

Question 3

(a) How much data would you lose if your computer's hard drive crashed right now? Could you reduce the amount of data that would be lost? How?

(b) Could you get enough information from the Internet to take out a loan in another person's name? You should provide any recent cases in Australia to support your explanation.

Topic 8 - Application security

Question 4

(a) Do you think programmers should be allowed to develop server-side dynamic webpages, given the dangers that are involved in doing so?

(b) A company is warned by its credit card companies that it will be classified as a high-risk firm unless it immediately reduces the number of fraudulent purchases made by its e-commerce clients. Come up with a plan to avoid this outcome.

Reference no: EM13337591

Questions Cloud

Find the speed of the chair : A "swing" ride at a carnival consists of chairs that are swung in a circle by 18.5 m long cables attached to a vertical rotating pole, Find the speed of the chair
Compute the current ratio and inventory turnover : Compute the current ratio, Inventory turnover, Receivables turnover, Book value per share, Earnings per share and describe the requirements for a change in accounting principle and at least four reasons why companies might implement a change in acc..
Explain the shortest and longest bond lengths : Using the periodic table only, determine which members of the set have the shortest and longest bond lengths. N-H N-S N-O
How far apart measured on the earths surface are atlanta : Assuming that the Earth is spherical and recalling that latitudes range from 0° at the Equator to 90° N at the North Pole, how far apart, measured on the Earth's surface
What are the two limitations of static packet filtering : Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.
Compute the net cash flow from operating activities : Prepare a schedule computing the net cash flow from operating activities that would be shown on a statement of cash flows using the indirect method and the direct method
What is the length of this physical pendulum : A rod suspended on its end and acting as a physcial pendulum swings with a period of T=1.49 sec. What is the length of this physical pendulum
What is maximum angular frequency with propeller can rotate : When the tips of the rotating propeller of an airplane have a linear speed greater than the speed of sound, the propeller makes a lot of noise, which is undesirable. If the length of the propeller is 2.354 m
Explain least likely to form colored compounds : Which of the following ions is least likely to form colored compounds? A) Mn2+ B) Cr5+ C) Sc3+ D) Fe3+ E) Co2+

Reviews

Write a Review

Computer Networking Questions & Answers

  Crack encryption key using brute force attack

Was Charlie exaggerating when he gave Peter an estimate for the time that would be required to crack the encryption key using a brute force attack?

  Design remote access plan which meets requirements

Design a remote access plan which meets requirements described so far. Your submission should include following. Details of your proposed remote access solution, including any hardware and/or software that would be needed.

  . label the rows that make good power ciphers and explain

a) Make a power table for numbers mod 11. Indicate how the table shows Fermat's theorem, label the primitive roots mod 11. Explain how you can tell they are primitive roots. Label the rows that make good power ciphers and explain

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

  Task of determining available wireless methods

You have been assigned th task of determining the available wireless methods that could be used to connect buildings to each other and presenting these options to executive team.

  Create a small network for an organization

You are to create a small network (less than 50 but greater than 20 nodes) for organization of choice consisting of multiple operating systems, security mechanisms, and devices.

  Describe how protocols make sure services running on device

Describe how protocols make sure services running on one type of device can send to and get data from many different network devices.

  Show rewsult of inserting these keys using double hashing

Show the result of inserting these keys using linear probing, using quadratic probing with c1 = 1and c2 = 3, and by using double hashing with h2(k) = 1 + (k mod (m-1)).

  Understand about compatibility in network architecture

What you understand about 'Compatibility' in network architecture and explain which topology suits the client-server network environment.

  Advantages of using extranet instead of private phone lines

Write down the benefits of using extranet instead of dedicated/private phone lines in this situation? How do you expect your customers restaurants to react to change to extranets?

  Explain authentication and authorization

Explain authentication and authorization. Which depends on the other? How and why are these processes more complex in a modern networked organization.

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd