StudentShare solutions
Triangle menu

Internet Security special aspects - Essay Example

Not dowloaded yet

Extract of sample
Internet Security special aspects

One good decision for testing a firewall is by hiring a third party penetration tester, which likewise test the whole network system for vulnerabilities. It is best for company to establish a contract with the penetration tester for data protection and likewise for the misunderstood violation of law that may be committed by the penetration tester. Penetration testing should undergo into the two types of penetration, namely the black box penetration testing and the white box penetration testing. In the black box penetration testing, we are simulating a real hacking, wherein only the IP address of the company is known. On the other hand, white box penetration provides tester are provided valuable information of the system like operation system used, the type of network used, the server configuration details, and the firewall itself. This will best bring up the different vulnerabilities of the company's network system.
In the case where we are unable to hire a third party penetration tester, we can however do it on our own. One thing we need to examine in our system is to know what are the open ports that the firewall currently allows. We can use nmap to scan different open ports in our system or use other third party or commercial or freeware port scanner. This scanner will determine open port(s) that hackers may used for intruding the system. Thus, we may know which port(s) are suppose to be open or those that need to block (some ports are need to be open since it is used by the system, i.e. port 80 for web server).
We can also used traceroute to determine if a certain unit within the network is traceable outside the firewall of the whole network system. This should not allow intruders to know something (i.e. IP address) about any of the unit inside the network nor that packets are roaming around our systems. The firewall should serve as a front-end security in order to provide "invisibility" to all the units within its perimeter.
The next idea is to ping each unit in the network system. We may used third party ping application for large scale ping requests like MegaPing. The idea of the ping is to determine if an IP address it active, or to say that a unit that has such IP address is visible or existing. Firewall should also provide a security measures regarding ping, of whether to allow or not such request to be process by the system firewall. Pinging are sometimes used by hackers in order to randomly know if a unit is existing, and if it does, attacks preside. Likewise, firewall should also not allow ping request from outside the perimeter to a unit inside the network. Units inside are invisible to units outside the firewall perimeter.

1c
To ensure the continuing effectiveness of the firewall, a regular random firewall testing should be done since attacking patterns change constantly. In addition, the test must first be authorized and the administrators not notified to ensure normal operations continue at the time of the test. This is to ensure that the security flaws in the existing configuration be identified.

1d
Packet filter is the most simple type of firewall that operates on network layer of OSI model. Packet filtering works on a set of rules stored as rulebase, which determines which packet are to allowed within the session, likewise which address are allowed for the communication process. If by default, a rulebase does not ...Show more

Summary

Layers 3 and 4 of OSI models uses packet filtering as a firewall security measures, with IP address in the packets, and also the ports, used to filter session that are admitted or otherwise drop. On the other hand, OSI layer 7, which is the application layer uses the packet itself as a data to filter session, and uses a application specific filtering like FTP.
Author : clara56
Internet Security special aspects essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Internet Security special aspects"
with a personal 20% discount.
Grab the best paper

Related Essays

Security Risk Assessment and Audit into the connection of the internal network with the Internet
In order to prevent the above from occurring, confidentiality, integrity, and availability of information has to be controlled through a careful process. Information confidentiality is maintained by preventing unauthorized persons from accessing vital system information.
18 pages (4500 words) Essay
Client,server scripting/internet security
In other words, it’s important to have a system for doing internet marketing right. This includes strategy, and establishing and developing the newest types of selling, trading and shipping processes. Over the years, Internet marketing has spread widely, and being noticed requires a huge effort in order to make your business idea appear irresistible.
8 pages (2000 words) Essay
Internet Security
Web Security. Web security or internet security is a subdivision of computer science, which precisely shares the internet, and typically encompasses the browser safety but similarly the network security. Web safety correspondingly comprises additional presentations or operating systems.
5 pages (1250 words) Essay
Internet Security
There are some instances when finding on-ground support is not easy enough to obtain especially for those owning small businesses online. Likely, seeking the help of professional individuals in the field of information technology does cost something, and practically, this amount is not quite a considerable amount that small business owners would like to pay.
7 pages (1750 words) Essay
Internet security
The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.
8 pages (2000 words) Essay
Internet Security: Awareness is Key
he risks that organizations face in advanced technological communications structures, one would be made aware of the factors that expose enterprises to network security breach. The origins of the internet dates back to as early as 1960s. Its evolution changed the course of
15 pages (3750 words) Essay
Internet Security
e in the concept of globalization because it is because of internet that the world has become a globe where people can correspond with one another in a very less time. With every beneficial invention, there are also disadvantageous aspects. Because of internet, there are many
7 pages (1750 words) Essay
Internet Protocol V.6 (IPv6) Deployment and Security Concerns
ith few scholarly applications, some examples include e-mail, customer service, and virtual updates to software, new online multimedia and technology updates. These technologies derived the scientist mind to have such network that can provide such features and high data rate.
8 pages (2000 words) Essay
Internet Security
The four aspects of security are regarded as Privacy, Authentication, Integrity and Nonrepudiation. Privacy is related with how Facebook users prevent disclosing their respective information to people who are unwanted and have no say
2 pages (500 words) Essay
Internet
The influence of the computer on the psyche of the child has both positive and negative effects. Still, I’d like to pay particular attention on negative aspects of using computer and Internet in childhood. For a child with his
4 pages (1000 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation