Nt1310 Unit 1 Network Security Research Paper

Improved Essays
Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.
Firewall
From a definition standpoint, a firewall is a hardware or software used in a networked environment to block unauthorized access by individuals while permitting authorized communications to and from the user. The firewall is often seen as a filtering wall that stands between the local network and the Internet. It jobs is filter out the traffic that might be harmful to the user device. The firewall monitors the ports that connect your network to the Internet and checks data packets before allowing them to pass through. A firewall can accept a packet, drop it -- erasing it from existence -- or deny it, returning it to the sender (Writer, 2013). It does this by using a technique known as “packet filtering”. What the is does is the packet filter checks the address information from the data packet to determine if the source, from which the packet originated, is allowed. If the address is on the list, the packet is allowed to pass. Otherwise the packet is dropped. Packet filtering also has a list of allowed protocols which can be used with it. Because the firewall can be set to use a list of rules to determine what data would be permitted to pass into or out of a network, the firewall is adequate to prevent outsiders from accessing a secure network. But that doesn’t make the firewall invincible, hackers and others can still breach a firewall with the correct know how (Aaron, 2002). They can accomplish this using a variety of methods of attack which cause the firewall to permit access to an unauthorized user. When this happen, it is called an intrusion. An attack hackers like to use in this intrusion is often a form of spoofing. In Address spoofing, the address information of a machine which is on the allowed list within the packet. Or have the packet appear as if it originated in the network that the firewall is protects, and is on the allowed list. Intrusion Detection System To combat this type of attack, Intrusion Detection and Prevention System (IDPS) are used. IDPS can block connections if it finds the connections is an intrusion attempt (Rowland, 1999). How an intrusion detection system (IDS) work is it
…show more content…
The firewall's job is to keep intruders from breaking into the user network. Yet the IDS doesn't keep them out, but it keeps track of attempts to break in. When it comes to how they are different the firewall and IDS are like two sides of a coin. A firewall can block connection, while an Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator while the firewall generally will not. They both can succumb to false positive. These false positives, or warning patterns don't really show an attack but because of a rule that is already in place if something is written ambiguously it may get flag as an intrusion (Writer, 2013). While it is not needed to have both/neither on a system they are consider the first and last line of defense for a computer network and should be use as such to keep the user

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    There are numerous reasons why there is a need for every home cook to own stainless steel bowls. The bowl made from stainless steel has a very durable built and it can even be your partner for a lifetime. These bowls can also keep all your cold items in its cool state as it insulates the items. If you have noticed in parties and social events, there are bowls made from stainless steel used for keeping items such as water, lemonade, soda and others, in order to keep it cool. Placing the bowl on the freezer for only very few minutes will allow it to keep those items placed on it for longer period.…

    • 513 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays