Question

List three primary goals of a firewall, and explain why each goal is important. 2. Describe...

  1. List three primary goals of a firewall, and explain why each goal is important.

2. Describe a three-tier architecture, and explain why this architecture is considered a best-practice.

3. Explain how you would architect a network that includes the servers listed below. How many different tiers would you include, and where would you place the firewalls? What is the purpose of each tier (what are you protecting, or what risk are you mitigating)?

a. Web server
i. Must be accessible from the Internet

b. Application server
i. Must be accessible from Web server

ii. Must be able to access Database and Credential store c. Database server

i. Must be accessible from Application server d. Credential store (e.g. Active Directory)

i. Must be accessible from Application server

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Please Note:
As per the Chegg Answering Guidelines, I have answered the first question. Please Re-post for the other Questions.

Q1.
Answer)
A Firewall is a security system hardware or software which controls the incoming and outgoing traffic to and from a PC or systems and thus analyzes the traffic based on the existing security rules and implements those rules on the traffic.
It is a tool which can assist IT professionals with the security of data and networks. A Firewall is a security system hardware or software which controls the incoming and outgoing traffic to and from a PC or systems and thus analyzes the traffic based on the existing security rules and implements those rules on the traffic. Firewall is a barrier between the trusted and untrusted network. Firewalls protect the trusted network and its resources from the outside unsafe and untrusted network such as the Internet.
The firewall will control the access control to assets by maintaining users access to the resources inside the organization and will also separate the internal and "trusted" resources from external and "semi-trusted" servers.
A firewall policy which controls the policy of the implementation of the firewall in the organization is created by:
a) Identifying all the requirements of the firewall
b) Creating rule-sets for implementing the firewall policy and firewall performance
c) Managing the firewall policies, architectures, software and other components throughout the life cycle of the firewall.
A firewall is useful to an organization with regard to resources which the organization wants to make publicly available (such as a web server) where the organization plans to grant public access and thus to protect the resources from being attack proof and hack proof the firewall has to be established. Also, the organization's internal resources have to be protected against the outside attacks and thus firewalls are important in web servers as well.

Add a comment
Know the answer?
Add Answer to:
List three primary goals of a firewall, and explain why each goal is important. 2. Describe...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You are given the following "informal firewall policy" details to be implemented using the firewall topology...

    You are given the following "informal firewall policy" details to be implemented using the firewall topology illustrated in slide # 22 (Chapter 9) Present the rules for the external and internal firewalll in a table format. a) Email may be sent using SMTP in both directions through the firewall, but it must be relayed via the DMZ mail gateway. External email must be destined for the DMZ mail server. b) Users inside may retrieve their e-mail from the DMZ mail...

  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand...

    The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand online. It is headquartered in Manhattan, New York. Their on-line application that allows its customers to access video content is currently running on their data center and comprises of the following tiers: a Microsoft SQL Server Database, a Web Front-End on a Windows Server with IIS, and a File System-based content store for image and video files. In addition, the company uses internally...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Suppose that you are managing a Swiss Chalet franchise and must recruit table servers for your...

    Suppose that you are managing a Swiss Chalet franchise and must recruit table servers for your store. List in priority the three things you would be most inclined to screen for, how you would do the screening, and provide a rationale for each. In reference to above, develop a set of three questions that could be useful in your background reference checks on applicants for the Swiss Chalet table server position and explain their use. If you discover that a...

  • 1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where...

    1.DNS can not work if the hostnames are not hierarchal? Explain? 2. Give two scenarios where DNS protocols (from two hosts) gets two different IP address for the same hostname. 3. If you have a 100% reliable network layer, should you use TCP or UDP at the Transport layer? Explain your answer? 4.Is it is possible for an application on top of UDP to have a reliable data transfer? Explain? 5.Suppose that a Web server runs in Host C on...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • 1.) Describe the goals of a Gel Filtration Chromotography Experiment??? 2.) Explain each key theoretical principle...

    1.) Describe the goals of a Gel Filtration Chromotography Experiment??? 2.) Explain each key theoretical principle of a Gel Filtration Chromotography, and how they help acheive the goal???. 4.) Explain the key equations used in the Gel Filtration Chromotography experiment and the terms involved in the equation???? HI im trying to prepare for a lab/report and i have some questions i could use help with please :) over all having trouble seeing how everything ties together etc :) thank you...

  • Please explain what is going on in this lab for STEP 3. what are some important...

    Please explain what is going on in this lab for STEP 3. what are some important factors? Multistep Synthesis Preparation of 4,4-Diphenyl-3-buten-2-one! This experiment illustrates se multistep synthesis, in which the the next. This process is very common iment illustrates several important concepts of organic synthesis. It is a synthesis, in which the product of one reaction becomes the starting material of This process is very common in industry and research, and demands careful to vields and techniques. The experiment...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT