This is done by creating tunnels connecting specific

This preview shows page 2 - 4 out of 7 pages.

layer and connection are address-based. This is done by creating tunnels connecting specific processes or systems on each side of the firewall. A circuit gateway is a separate type of firewall and does not look at data traffic flowing between networks. (pg 330-338) 7. What special function does a cache server perform? Why is this useful for larger organizations? A cache server makes frequently used pages available. Large organizations use cache servers to make sure pages that market their products are pre-rendered and ready to send instead of asking for a full request from a webpage host. Cache servers are an extra layer of protection against attacks because only portions of a website can be attacked at one time. (pg 320 – 340) 8. Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model. Packet filtering firewalls work at the transport layer of the network. The types of firewall include static filtering, dynamic filtering, and stateful
Image of page 2

Subscribe to view the full document.

inspection filtering. Packet filtering interacts with network traffic to confirm or deny based on a rule set for a packet going up against a set of rules that is determined. Static filtering is put up against a rule set for each packet, while dynamic filtering filters packets depending on network traffic and usage limits. Stateful inspection filtering examines packets and verifies where they are coming and going, determined via logs. (pg 315 -330) 9. What is a hybrid firewall? A Hybrid firewall is a combination of the foundations of filtering of other types of firewalls. Elements of packet filtering and proxy services or elements of packet filtering and circuit gateways are examples of combinations. (pg 323 – 333) 10. Describe Unified Threat Management. Why might it be a better approach than single- point solutions that perform the same functions? How might it be less advantageous? Unified Threat Management (UTM) is a network security function which assimilates multiple security services into a single device or service. The alternative to UTM is to have multiple, separate devices to perform one or more functions. The advantages of UTM are low up-front cost, low power consumption, less physical space, low maintenance costs, fully integrated and easy install and configure. One appliance is cheaper than buying multiple. One necessary source of power means less power and less lost while reducing line voltage to the levels network devices use. One device for multiple services saves physical space for other network equipment. UTM devices are designed for all services to work together without leaving holes in protection. Finally, the configuration for one device or service is more simple than configuring multiple devices.
Image of page 3
Image of page 4
  • Fall '16
  • Barnes
  • Computer network, Router, Transmission Control Protocol, Packet filtering, Computer network security

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern