UC Firewalls so Important Within an IT Environment Discussion: Website Design Answers 2021

UC Firewalls so Important Within an IT Environment Discussion: Website Design Answers 2021

UC Firewalls so Important Within an IT Environment Discussion: Website Design Answers 2021

Question Title:

UC Firewalls so Important Within an IT Environment Discussion

Full Question:

Unformatted Attachment Preview

IMPORTANCE OF FIREWALLS WITHIN AN IT ENVIRONMENT
1
1St Discussion:
Importance of firewall:
In simple terms, Firewall is a packet filter that prevents malicious contents from getting
inside our network, or prevents us from accesing a malicious site.A typical firewall is software
that can look at those packets read the protocols and decide if the packet will be allowed to
continue to the next step on the path between the “where they are coming from” and “where they
are going”.Network traffic is comprised of packets — there are typically many of them for any
given request like loading a web page. The packets contain information about where they are
coming from and where they are going and of course carry information such as the request for a
web page or the response (Dowd & McHenry, 1998). The exact format of the packets depends on
the type of software that is trying to communicate, but there are prescribed formats in various
protocols.
Firewall types:
Different firewall software varies in how it looks at the packets and how you can tell it
about packets that you don’t want to traverse. The firewall on your computer for example should
look at packets coming to your computer from anywhere and decide if they are following all the
rules.
Firewall can divide into two categories- A firewall is a software utility or hardware device that
acts as a filter for data entering or leaving a network or computer.
IMPORTANCE OF FIREWALLS WITHIN AN IT ENVIRONMENT
2
Hardware: Basically the router is used for hardware firewalls but any other security product
can also use. Hardware firewall is placed between your PC and the outside world. Router and
Security device can connect more than one device at a time. It is a tangible product or devices
that secure system and PC from outer threads, viruses, malware and many more harmful
viruses (Graceful, 2018).
Software Firewall: Software firewall is an intangible product. Software Firewall is a program
and set of codes that install in computer or system. In case of attack software firewall hide open
ports and will deflect incoming attacks. Software Firewall also aware and warn from suspicious
outgoing traffic. When software firewall present in a system an attacker will have to cross two
level securities to access your PC and it’s too difficult for any attacker.
All firewall products do not check incoming code for signs of viruses and Trojan horses.
You will still need to implement hardware level security, operating system security, application
security, and concrete policies and procedures. Even if they are not 100% guaranteed, you still
need space to add additional levels of security to your enterprise data.
IMPORTANCE OF FIREWALLS WITHIN AN IT ENVIRONMENT
3
2nd Discussion:
A firewall is a shield that safeguards the IT infrastructures from unwanted access to and
from a private network and enhances the computer systems’ security and other devices connected
to the network via the internet. The firewall helps monitor network traffics and identifies and
blocks unwanted traffics that is suspicious according to the firewall set algorithms.
Importance of firewall within IT environment includes; monitoring network traffics. All
the data which emerges in and out of the computer systems poses possibilities of threat and
compromises the all-organization activities (Vacca, J. R. 2017). The firewall conducts
monitoring and analysing of all incoming network traffic and checks all according to the set
algorithms and keeps filtering all the systems and protect from unwanted.
Also, a firewall helps stop virus attacks since the virus is the main thing that shuts down
all the digital operations. However, a firewall helps control the entry points of the virus and stops
the virus from entering into the system. Without the firewall, the IT environment faces a lot of
losses depending on the types of viruses.
Also, a firewall stops spyware in any IT environment. There are many confidential data,
and the most significant thing is to stop the spyware from getting access and get into the system.
Since the IT environment is growing and becoming more complex and very robust, the entry
points of attacks can be utilized by attackers to access the company system (Oppliger, R. 1997).
Also, it makes the system vulnerable granting attackers exploit the system. However, the firewall
helps in protecting the organization from all the spyware.
There are different types of firewalls which include; Packet filtering, circuit-level
gateways, Stateful inspection firewalls, application-level gateway, software firewall, hardware
firewall, cloud firewall, and nets gen firewall.
Packet filtering is one of the oldest firewall architecture types used to create checkpoints
at a traffic router or switches (Jingyao, S., 2019). A firewall helps perform simple checks of the
data packets emerging through the router and inspects the data, including the destination and the
IMPORTANCE OF FIREWALLS WITHIN AN IT ENVIRONMENT
origin of the IP address. However, they are not used nowadays since its simple to bypass
compared to others.
Some of the concepts to be considered include the high availability firewall. When
updating firewall solutions, the concept to view assists in keeping the firewall solutions running
uninterrupted over a period, without failures and functioning problems. It implies that the
services have to sit running regardless of the time of updates.
4
Project: Securing a Microsoft Windows Environment
Windows Hardening Recommendations
Scenario
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication,
networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:




Previous attempts to protect user accounts have resulted in users writing long passwords down and placing
them near their workstations. Users should not write down passwords or create passwords that attackers
could easily guess, such as words founds in the dictionary.
Every user, regardless of role, must have at least one unique user account. A user who operates in multiple
roles may have multiple unique user accounts. Users should use the account for its intended role only.
Anonymous users of the web server applications should only be able to access servers located in the
demilitarized zone (DMZ). No anonymous web application users should be able to access any protected
resources in the Always Fresh IT infrastructure.
To protect servers from attack, each server should authenticate connections based on the source computer
and user.
Tasks
Create a summary report to management that describes a hardening technique that addresses each issue listed
above. Provide rationale for each selection.
Required Resources


Internet access
Course textbook
Submission Requirements




Format: Microsoft Word (or compatible)
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: 2 to 4 pages
Self-Assessment Checklist



I addressed all issues required for the summary report.
I created a well-developed and formatted report with proper grammar, spelling, and punctuation.
I followed the submission guidelines.

Purchase answer to see full
attachment

This question was handled by a Studyhelp247 Website Design tutor and the student left a positive review. 19+ custom answers have been given to students for this question in November 2021 alone. To avoid plagiarism and maintain student privacy, we do not resell answers. Get your custom solution now. It is affordable.

Bram Eldoff, Founder, Studyhelp247.com

Consider this Website Design Assignment Done
Beat its deadline and stringent requirements.

[advanced_iframe securitykey=”your key” use_shortcode_attributes_only=”true” src=”https://core.studyhelp247.com/main-site-question-post/” id=”example4″ height=”350″ width=”450″ show_part_of_iframe=”true” show_part_of_iframe_x=”-100″ show_part_of_iframe_y=”75″ show_part_of_iframe_width=”450″ show_part_of_iframe_height=”350″ show_part_of_iframe_new_window=”_top” show_part_of_iframe_new_url=”https://core.studyhelp247.com/new-question-posting/”]

>Approximate cost: $8 per page.<br>>Choose your own tutor.<br>>Get free revision, plagiarism reports, and a list of sources.<br>>Release the money only after delivery

How it Works

hw

Why you should post this Website Design question now.

Flawless Deliveries
Our tutors deliver fault free assignments after careful and detailed research. All instructions are followed to the letter.

100% Originality Guarantee
Every task delivered to students on our platform has 100% originality guarantee. Find plagiarism, get 100% money back.

Timely Deliveries
When you post a question here, we assure on-time delivery, or 100% money back. You cannot miss deadlines with us.

24/7 Customer Support
Our support agents are always online, ready to help you when using our platform. It only gets better.

Student-Friendly Prices
Getting quality help should not break your pocket. Find instant quality help for whatever budget you have.

Free Revisions
You can request your tutor for as many revisions as needed to ensure you are 100% satisfied with our services.

100% Privacy
Every action you take on our platform is anonymous. Once you receive your help, it is almost as if you weren’t here.

100% Refunds
If a tutor breaks any of our guarantees, you get 100% money back to ask questions in the future. No questions.

Here are other questions on different subjects that our tutors have handled with excellent results.

The first ones are American University of Armenia Consumer Culture Theory Discussion Journal and MU Public Participates Antibiotic Resistance Prokaryotes & Dysbiosis Discussion which required in-depth research and computations. The third and fourth ones are UC Firewalls so Important Within an IT Environment Discussion and SCI 200 Strayer University Week 6 Buying Organic Food Worksheet, which called for experts to help with online quizzes. All these were answered for students who were looking for study assistants for homework help 2021

Reviews from Students; Verified by Trustalyze

Studyhelp247 Exceeded my expectations.

Rated 5 out of 5
2 years ago

I believe in studyhelp247 now. Here, I found the best tutor to assist me with a complex math task. It was seamless using the site.

Avatar for SdfDsf
SdfDsf

Response from Studyhelp247

Thank you for using our platform to find academic help. We are happy that you found what you were looking for.

By far, the best source of affordable custom writing solutions.

Rated 5 out of 5
2 years ago

I came to studyhelp247 after seeing an ad and they have been great. It is quite affordable owing to the fact that there are no service fee charges.

Avatar for Student01
Student01

Response from Studyhelp247

Thank you for the great review. We are committed to providing the best platform to foster student excellennce. 🙂

Very responsive support

Rated 5 out of 5
2 years ago

I have enjoyed using studyhelp247. The support was very responsive and I received quality work

Avatar for Alsalem
Alsalem

Response from Studyhelp247

Thank you.
Our support agents are always available to assist you with any issue.

Great work done for me by Anastacia.

Rated 5 out of 5
2 years ago

Thank you for the great work that you delivered. I will be back for more. 🙂

Avatar for Elsie
Elsie

Response from Studyhelp247

Thank you for using our site.

Refund Reason

Assignment Help. All November

Nov 2021 Offer

Get 50% Discount 

Happy Student - Studyhelp247

Press ENTER or click get started below to submit. 

Via Email

A Minute,

THIS YEAR, YOU EXCEL

Post Any Question for           Instant Assistance from Qualified Tutors.

 

Pay 10% Less when Hiring.

 

Get a Professional Tutor / Writer for as Low as $1