Studyspark Study Document

Firewalls and Filtering Research Paper

Pages:4 (1317 words)

Sources:4

Subject:Technology

Topic:Firewalls

Document Type:Research Paper

Document:#22384393


Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment processing and customer data.

The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the deployment in the ABC system. It combines traditional firewall with other network devices that filter unauthorized network protocols. In a distributed system where traffic is passed through different nodes, denial-of-service attacks can come from multiple sources and this needs firewalls to detect and neutralize these attacks to protect the integrity of the data.

In ABC, the model of web application distribution used is a balancing load technique. This technique is used to distribute maximum workload over various nodes in the company’s network. It is further used to balance HTTP traffic across multiple servers thus making it an effective front-end service. Using this model, web traffic can be distributed intelligently across many servers using defined protocols (Martin C. Libicki, 2015). Processing load can thus be shared by many nodes and increases the reliability of the web application. In this case, ABC is able to process online payments, update customer data, and advertise their products online. The model redundancy is always considered during design for the organizations’ web applications since it enhances performance and prevents system lags during high activity.

In a distributed system, the historical intelligence or perceptive algorithm technique is deemed appropriate when loading and balancing web traffic to a web application. The method determines a particular node in which to send traffic using both response time of nodes and the amount of available connections between the server and load balance (Mays, 2018). A Zeus load balances can add traffic gradually to newly added servers without protocols and sometimes this is a vulnerability since the problems in the server might be as a result of a glitch or an attack in the system making it dangerous and vulnerable to breach.

A…

Some parts of this document are missing

Click here to view full document

…the honeypot is scrutinized to assess its threat and redirected to the sandbox (Anderson, 1997). This measure is important since in the sandbox, it is safer to analyze the intricacies of the packets of data and also their integrity without any compromise to the system. The need to get a secure network, in the case of ABC, their customers can be denied access to their online platform, stalled payment processing and being unable to update customer data from their servers due to connection interruption, this can go a long way to a hardware based intrusion detection system to make the network secure.

A secure system needs a honeypot, a next generation firewall and intranet system to ensure that the data is secured. In ABC, the middle layered system whereby customer data, secure payment gateways and intricate customer data needs to be protected needs the attention of network engineers and appropriate methods to determine a particular node in which to send traffic using both response time of nodes and the amount of available connections between the server and load balance. A hardware based intrusion detection system makes the network secure and using intranet and hidden security protocols makes it important for the security and…


Sample Source(s) Used

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web: https://www.liquidweb.com/kb/understanding-load-balancing/

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Firewalls Great Network Security Devices but Not a Silver Bullet Solution...

Pages: 5 (1472 words) Sources: 10 Subject: Education - Computers Document: #64893963

Firewalls: Great Network Security Devices, but Not a "Silver Bullet" Solution In construction, a firewall is a hardened divider between the hostile external environment outside and what needs to be protected inside. Similarly, firewalls are designed to protect computers from being accessed by unauthorized individuals, and for the most part, they perform this task well. Unfortunately, firewalls are also akin to the castles of old when siege weapons were built to

Studyspark Study Document

Firewalls Computers Have Become an

Pages: 8 (2053 words) Sources: 1+ Subject: Education - Computers Document: #74797621

Which Products are Best Suited to a Small LAN With One Publicly Accessible Web Site: Cisco PIX Firewall Software is an excellent solution for small LANs with one publicly accessible web site. "Integrated Cisco PIX firewall hardware and software delivers full stateful firewall protection and IP Security (IPSec) VPN capabilities, allowing (...) rigorous (protection of...) internal network from outside intrusions" ("Cisco PIX," 2005). Cisco PIX firewall differs from typical CPU-intensive full-time

Studyspark Study Document

Firewall to Protect Companies a Firewall Is

Pages: 2 (559 words) Sources: 2 Subject: Education - Computers Document: #17519463

Firewall to Protect Companies A firewall is used to protect a person or business' network from exterior harms. Firewall may use packet filtering, user or client application authentication in order to protect the network. The actual process of protecting a network requires a firewall to filter incoming packet sizes, source IP address, protocol, and destination port. Administrators of a network are able to enact firewall protection on a router and

Studyspark Study Document

Spam Filtering Solution Available and

Pages: 35 (10063 words) Sources: 1+ Subject: Education - Computers Document: #61359581

However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the

Studyspark Study Document

SL/https De-Encryption SSL/https is Widely

Pages: 63 (17577 words) Sources: 47 Subject: Education - Computers Document: #77021062

This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use

Studyspark Study Document

Network Security

Pages: 4 (1437 words) Sources: 5 Subject: Education - Computers Document: #61685576

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Join thousands of other students and

"spark your studies".