Preview

ITNE455-1204A-01 U3GP3

Powerful Essays
Open Document
Open Document
5030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ITNE455-1204A-01 U3GP3
Abstract
Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.
Architecture Considerations for Perimeter Security
State-Based Filtering – Most firewalls today utilize state-based filtering. This filtering is a mechanism in modern firewall technology that maintains a list of current, active connection states that traverse the firewall (AIU Online, 2012). When an application inside the firewall requests a connection to another application running outside the firewall, a connection state is created. The addresses of the two communicating applications are saved in a table, so that the firewall can allow all traffic between them through until the initial connection is terminated. Without state-based connection monitoring and filtering, web pages would not display information as users would expect. This is because firewalls filter traffic using a combination of IP and port number. Web servers usually use port 80, but web based applications. Just as internet browsers, choose a random port number to listen on when a request is initiated. Without state-based filtering when the listening port number changes, the connection would be terminated and requested information would not be received. State-based or stateful filtering most significant advantage is that this technology allows the connection to stay open and active until the connection is terminated by the applications that requested the connection (Hinnerschietz, n.d.). Another name for state-based firewalls is circuit level gateways. Rather than



References: Adams, Karen, (2012). Types of Intrusion Prevention Systems. Retrieved September 6, 2012 from http://www.ehow.com/info_8039841_types-intrusion-prevention-systems.html AIU Online Beasley, J. (2009). Networking (2nd ed.). Boston: Pearson Education, Inc. The Benefits of Router-Integrated Session Border Control (2012) Retrieved from http://www.juniper.net/us/en/local/pdf/whitepapers/2000311-en.pdf Bradley, Tony, (2012) Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm Carter, Earl, (February 15, 2002) Little, M. (1989, October). Goals and Functional Requirements for Inter-Autonomous System Routing: RFC 1126. Retrieved from http://tools.ietf.org/html/rfc1126 Mansfield, K

You May Also Find These Documents Helpful

  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Week5textbookquestions

    • 348 Words
    • 1 Page

    R29. Stateful packet filters maintain two data structures. Name them and briefly describe what they do.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Intrusion Detection Systems In 1980, James Anderson’s paper, Computer Security Threat Monitoring and Surveillance, bore the notion of intrusion detection. Through government funding and serious corporate interest allowed for intrusion detection systems(IDS) to develope into their current state. So what exactly is IDS? An IDS is used to detect malicious network traffic and computer usage through attack signatures. The IDS watches for attacks not only from incoming internet traffic but also for attacks that originate in the system. When a potential attack is detected the IDS logs the information and sends an alert to the console. How the alert is detected and handled at is dependent on the type of IDS in place. Through this paper we will discuss the different types of IDS and how they detect and handle the alerts, the difference between a passive and a reactive system and some general IDS intrusion invasion techniques.…

    • 1603 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Firewall Security

    • 2313 Words
    • 10 Pages

    The primary purpose of the firewall is to take a proactive and preventative measure approach to diminishing the numerous electronic security intrusions possible in today’s internet age. A firewall also provides the next level of protection by denying access to certain network services and ports based on policy and need. (Eugene H. Spafford, 2003, Cyber Terrorism: The New Asymmetric Threat).…

    • 2313 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Intrusion Prevention Systems (IPS), also known as Intrusion Detection and Prevention Systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity. [1]…

    • 467 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Bibliography: Chen, Ke, Chen, Gang, and Dong, Jinxiang. (2005). An Immunity-Based Intrusion Detection Solution for Database Systems. In Wenfei Fan, Zhaohui Wu, Jun Yang (Eds.), Advances in Web-Age Information Management (pp. 773-778). New York: Springer-Verlag.…

    • 2529 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Introduction: An intrusion detection system (IDS) is a device or software application that monitors network system activities for malicious activities or policy violations and produces reports to a Management Station.…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Business

    • 2429 Words
    • 10 Pages

    Intruder Detection Accuracy Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored…

    • 2429 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Virus Attack Prevention

    • 595 Words
    • 3 Pages

    In doing more research on attack prevention, I learned that References: Hulme, G. (2004, October 11). Security: Get Your Shields Up! InformationWeek. Cisco Systems. Retrieved on July 12, 2008, from http://www.developers.net/ciscoshowcase/view/1201…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Firewalls

    • 253 Words
    • 2 Pages

    Firewalls There are three main types of firewalls that are used in the networking community. The three types are Network-level, Circuit-Level Gateway, and Application-Level. Network-level Fire walls work at the network level. It inspects packet headers and filter traffic based on their source and destination. According to "Pc Results Inc." (2013), "They also take into account IP addresses, ports used and services requested.” Circuit-level Gateway firewalls work by determining the legitimacy of a requested session. This is done by monitoring the handshake between packets. This type of firewall can hide a network from hackers in the outside world as well as restrict session rules to known computers. Application-level Gateway is also known as a proxies firewall. This firewall functions similar to a circuit level firewall. The exception being work on specific applications. According to "Pc Results Inc." (2013), "They protect the network from malicious attacks, spam and viruses. They can also block websites based on content and not IP address.”…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Paul Cichonski, T. M. (2012). U.S. Department of Commerce NIST Computer Security Incident Handling Guide. Washington D.C.: U.S. Government.…

    • 1779 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Firewalls

    • 964 Words
    • 4 Pages

    Firewall Type | Characteristics | Packet filtering firewall | A packet filtering firewall makes decisions about which network traffic to allow by examining information in the IP packet header such as source and destination addresses, ports, and service protocols. A packet filtering firewall: * Uses access control lists (ACLs) or filter rules to control traffic. * Operates at OSI layer 3 (Network layer). * Offers high performance because it only examines addressing information in the packet header. * Can be implemented using features that are included in most routers. * Is a popular solution because it is easy to implement and maintain, has a minimal impact on system performance, and is fairly inexpensive. A packet filtering firewall is considered a…

    • 964 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    LAB 7 Security Basics

    • 1023 Words
    • 3 Pages

    Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not. Software firewall process all requests by using the server resources. Apart from performance limitation, the software firewall has numerous advantages.…

    • 1023 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Introduction Intrusion Detection System is any hardware, software, or a combination of both that monitors a system or network of systems against any malicious activity. This is mainly used for detecting break-ins or misuse of the network. In short, we can say that IDS is the ‘burglar alarm’ for the network because much like a burglar alarm, IDS detects the presence of an attack in the network and raises an alert. An IDS provides three functions: monitoring, detecting and generating an alert.…

    • 1131 Words
    • 5 Pages
    Powerful Essays

Related Topics