Nt1310 Unit 1 Network Security Research Paper

Improved Essays
Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.
Firewall
From a definition standpoint, a firewall is a hardware or software used in a networked environment to block unauthorized access by individuals while permitting authorized communications to and from the user. The firewall is often seen as a filtering wall that stands between the local network and the Internet. It jobs is filter out the traffic that might be harmful to the user device. The firewall monitors the ports that connect your network to the Internet and checks data packets before allowing them to pass through. A firewall can accept a packet, drop it -- erasing it from existence -- or deny it, returning it to the sender (Writer, 2013). It does this by using a
…show more content…
The firewall's job is to keep intruders from breaking into the user network. Yet the IDS doesn't keep them out, but it keeps track of attempts to break in. When it comes to how they are different the firewall and IDS are like two sides of a coin. A firewall can block connection, while an Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator while the firewall generally will not. They both can succumb to false positive. These false positives, or warning patterns don't really show an attack but because of a rule that is already in place if something is written ambiguously it may get flag as an intrusion (Writer, 2013). While it is not needed to have both/neither on a system they are consider the first and last line of defense for a computer network and should be use as such to keep the user

Related Documents

  • Improved Essays

    Before making an application live developer may also leave certain debug options running in order to re-examine. Special attention must be given to these backdoors as attacker can gain unprivileged access to the website [31]. Since these debug options facilitate back-end entry to the developers, and sometimes these debug options are left enabled unnoticed, this may provide an easy entry to a hacker into the web-site that let him make changes at the website level [31]. Now that we have seen some of the application level threats to the system we will look into what security measures can be used to avoid such attacks. Best way to achieve an application level security in a cloud environment is to analyze and address security threat at various cloud service model such as SaaS, PaaS and IaaS .For example in case of IaaS service model developers are given capability to develop and deploy application in a cloud environment.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Risk Analysis Assignment

    • 1273 Words
    • 6 Pages

    (1) What are some safeguards to prevent any network or computer system attacks? One of the first ways than an organization can prevent a computer system attack is by installing a firewall. This will serve as a way to filter data between a host and another network. (2) Risk analysis is not a single activity, but rather a group of related activities. They typically take which sequence of steps?…

    • 1273 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The website firewall, depending on how secure it is, would be used to lower the risk of these things happening. A firewall is a network security system which controls the incoming and outgoing traffic. This would be controlled by the rule set that has been applied to it. This firewall creates a barrier between the users and the website, stopping unwanted traffic from entering the network. The Secure Sockets Layer is different piece of security compared to the firewall however.…

    • 1884 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Cyber Bullying Prevention

    • 1054 Words
    • 5 Pages

    Reporting brings whatever is being reported to instagram’s attention. Questions about why something is being reported are asked. For example it asks if it is breaking the community guidelines and then gives options as to how they are being broken. Accounts that are investigated can be deleted off the site. Another easy way to prevent cyberbullying is being careful when posting.…

    • 1054 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    The consequences can be website damage and destruction, compromised information, alteration of data (users ' personal data), and web server infringement. So ensuring that throughout the development lifecycle security is embedded and check can help to alleviate or at least minimize these…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Mike Lynn: Whistleblower

    • 1252 Words
    • 6 Pages

    Cyber security is a very sensitive matter as internet is supposed to be a place where your data could stay private but lately it hasn’t been the case. The problem could’ve been addressed by insurance from both parties that they won’t take a rash action without consulting each other first. Mike Lynn got frustrated after he was forced to stay quiet over a matter which he thought was necessary for others to know but also it wasn’t good for Cisco’s business. There needs to be an understanding between the employer and the employee which wasn’t present in this case causing a near disaster situation. Mike Lynn could also have been more patient and waited a bit more…

    • 1252 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    d. Any files received either electronically sent or through removable media should be scanned for probable malicious software content. e. Electronic mail attachments and downloads should be checked for malicious software before use. The corporate email system should be protected against this and “SPAM”. f. An incident response procedures and team should be established to deal with the outbreak of this malicious software. g. User awareness and training should be periodically done to inform users of the risks associated with obtaining files and software either from non-trusted websites, or on any other medium, indicating what protective measures should be taken.…

    • 1344 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013). Method for data exfiltration includes: Backdoors: This method used by the attacker to capture keystrokes, as well as video and audio of the system’s environment, using attached audio microphones and video cameras File transfer protocols Abuse: Attackers can abuse legitimate Windows features as well. For instance, attackers can…

    • 1307 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Detection Of Smart Phones

    • 712 Words
    • 3 Pages

    One such fraudulent activity is the caller identification spoofing attack. Unfortunately, the security standards are not strong enough to detect and prevent such fake calls. They become dangerous conduits for Internet security threats to reach the telecommunication infrastructure. This paper aims at detecting the spoofed phone calls and preventing such calls. This scheme is implemented…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies. Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it. (Kim, D. & Solomon, Michael 2014, page 486).…

    • 706 Words
    • 3 Pages
    Improved Essays