Question

Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a...

Thoughts and feedback on this?

According to Cisco, a network device manufacturer, a firewall is a security device that can analyze network traffic and determine if it needs to be blocked or allowed per predetermined rules.1 Most modern PC operating systems, as well as Wi-Fi routers, have a built-in firewall which is mostly suitable for a single endpoint or SOHO. Enterprise firewall appliances are more powerful and configurable than consumer-grade software-based firewalls, pfSense, for example, supports advanced features such as IDS/IPS, captive portals, traffic shaping and many other features.2 While a home or small office network might be well served by a lower end firewall, enterprise firewalls typically have better hardware to allow them to manage the additional features and large networks consisting of hundreds or thousands of users, multiple VLANs, and satellite locations. Whatever the use case, a firewall is a good idea for any network as an extra level of network security from unsafe browsing habits and other lapses of end-user judgment. 

 

Wireless connections, like Wi-Fi, are inherently more insecure than wired connections due to the fact that both the sending and receiving devices broadcast information over a wide area as wireless devices are mobile. Bluetooth does have some security measures such as encryption and the use of a PIN for pairing devices. For increased safety Webroot recommends turning off Bluetooth when it is not being used, using only devices that comply with the newest standards and security measures, and to change default PINs on devices when possible.3

 

RFID is frequently used in the shipping industry to quickly and easily track and identify packages. The technology works well for this as the trackers don’t require constant power and receivers can communicate with the tags from up to 100 meters (for UHF devices). Both wireless and Bluetooth devices need power on both ends to communicate which is impractical in this application. With modern manufacturing advances, all of these technologies can have very small radios/receivers, however, RFID clearly has a size advantage with chips being 0.05 x 0.05 mm.4

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hello! I have gone through your question and taken an understanding. Sharing my thoughts and feedbacks below. Kindly consider giving an upvote to help me keep answering on Chegg. Cheers :)

Firewall devices as mentioned, for consumer grade needed to be a separate device only until the need of internet was not everywhere(1980 to 1990). With the increasing popularity of personal computers and the demand of internet for everyone the need of security also arouse. This gave birth to firewall devices ensuring integrity and security over wired internet connections. Fast forwarding to the current scenario where there are handheld devices which have access to the internet and the increased speed of network data transfer, several modifications in the routers and firewall devices have taken place. This has integrated a modem with a wireless router which also has a firewall device built in. However these kinds of devices are only consumer grade and can be used only at homes or small scale shops.When there are big organizations or production grade facilities that have multiple devices that need access to the internet , a small scale router with built in firewall is not sufficient to monitor the network data traffic or the usage history analysis. This provides reason to implement a production grade server firewall and a network process controller that controls the data traffic(routing the data).

As mentioned about Wi-Fi, the wireless connection of a device to a router does not require any physical connection or link between the device and the router while a wired connection always has a physical connecting medium (LAN cable or a fiber optic cable) between the device and the router. Thus with proper software and knowledge anyone would be able to monitor and access the data of a system connected on Wi-Fi whereas physical intervention would be required to manipulate with a wired network connected device. This regards to explain why wired connection is regarded to be secured on comparison with Wi-Fi. Bluetooth, on one hand only provides security in the form on a PIN which is usually either 4 or 6 digits. This provides the least security and is easy to breach since the form of encryption over this type of network transfer is very minimal to zero.

RFID devices as mentioned, can communicate over long distances without the need of power. This is possible since there is no need to have a established link between two devices constantly for a long period of time over a particular distance. RFID devices usually send or receive signals , one at a time. i.e., either send or receive. This is not the case with Wi-Fi or Bluetooth which need to first have a established connection and then send huge amounts of data to one another. RFID devices typically have use case scenario to track location, implant on pets and so on. So the data transmitted is basically very minimal which would be Geolocation, coordinate information thus having no requirement for power consumption.

Add a comment
Know the answer?
Add Answer to:
Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • Plz answer 27 to 40 flooding the network with 27. Which of the following is a...

    Plz answer 27 to 40 flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...

  • Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks...

    Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks and delay. We often need I2 Marks ) a. less throughput and less delay b. more throughput and less delay c. less throughput and more delay d more throughput and more delay 1 1 1 1 1 1 1 1000000000011000010101010101101010101011 is._L 2 Marks ] a. Unicast b. Broadcast c. Multicast d. None of the above 2 Marks) 3. The maximum data length for 10...

  • 4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit go...

    4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit going forward? 5. Analyze the company’s financial performance. Do trends suggest that Fitbit’s strategy is working? 6.What recommendations would you make to Fitbit management to address the most important strategic issues facing the company? Fitbit, Inc., in 2017: Can Revive Its Strategy and It Reverse Mounting Losses? connect ROCHELLE R. BRUNSON Baylor University MARLENE M. REED Baylor University in the...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT