StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Positioning Firewall between Internal and External Domains - Essay Example

Cite this document
Summary
The paper "Positioning Firewall between Internal and External Domains" states that the diodes prevent computers in the internal domain from trusting computers in the external domain. This is done to ensure that all the machines in the internal domain are protected from external threats…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Positioning Firewall between Internal and External Domains
Read Text Preview

Extract of sample "Positioning Firewall between Internal and External Domains"

A firewall may take the form of hardware or software components or a combination of both. Anita (2011, p.294) notes that a firewall plays a vital role in an organization since it bars computers in one network domain from communicating directly with other network domains. He also points out that all communication takes place via the firewall, which monitors all the incoming data before allowing it to go to the local network.
As in the case of ABC Company, there are several reasons why the firewall was placed between the internal and external domains. Firstly, the company reports that most of its employees are not privy to all the information. As such, a firewall is positioned between the internal and external domains so that their access and trust can carefully be predicted and monitored. The reason is, if their home machines which live outside of the firewall are interfered with, then the sensitive equipment found inside could also be at high risk of being compromised. Therefore, a firewall is put at the boundary to prevent security threats from external users.
Secondly, the firewall is positioned in between the internal and external domains to provide security by examining all the incoming data packets from the general public to ensure that they are only allowed to enter the local network after meeting the security conditions. This prevents putting the internal domain at risk of sabotage among others. Anita (2010, p.294) notes that the firewall provides user authentication by approving the password and username, which ensures that only authorized users are allowed access to the internal domain.
The other important reason why the firewall was placed between the internal and external domains is to hide the contents and structure of the internal domain from external users. The company notes that it became necessary to hide some of the contents and structures found in the internal domain from unscrupulous users that may interfere with its contents and structure. Doing this was only possible by positioning the firewall at the boundary to ensure that unscrupulous external users are denied access to the internal domain unless otherwise authorized by the management. Anita (2010, p. 294) points out that Network Address Translation (NAT) obscures the internal network address and replaces all the IP addresses of the local network with one or more public IP addresses.
Finally, ABC Company reports that transitive trust has been an issue in the organization for a very long period. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 8 Group Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 8 Group Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1602073-week-8-group
(Week 8 Group Essay Example | Topics and Well Written Essays - 500 Words)
Week 8 Group Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1602073-week-8-group.
“Week 8 Group Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1602073-week-8-group.
  • Cited: 0 times

CHECK THESE SAMPLES OF Positioning Firewall between Internal and External Domains

Network Security setup

User domain usually entails all the employees of Richman investments, these also includes consultants, contractors and even other third party users.... It is essential to ensure that each of the users who access and use the IT infrastructure of the organization should review and sign acceptable use policy in order to be granted permission to use the resources of the organization....
7 Pages (1750 words) Research Paper

Network Administration

Basically I need the following underneath reworded and re-styled so it looks different.... It's the work of a previous student to the college however I require this piece to be reworded in such a way, that it cant be considered the same piece of work.... It must look different aswell as have words changed around, sentences reworded etc....
37 Pages (9250 words) Essay

Business Report to managment on online entertainment

Entertainment is a major industry the World over.... In the age of the internet it provides opportunities for linking all sources of amusement, fun and leisure in one source.... EntertainYou.... om is a company which plans to exploit the potential of the internet to provide the viewer a rich experience of a wide variety of entertainment in a single channel at home....
20 Pages (5000 words) Essay

The Three Strategic Business Units of the Company

The case of Feingold Investments Inc.... was discussed with emphasis on the current problem arising out of the decision to install a LAN at the new office is set up to house the three Strategic Business Units of the company.... Three major problem areas being Management, Technical and Behavioral were identified....
24 Pages (6000 words) Essay

Strategic Decision Making

Moreover, the internal environment, including the strength and weakness of a company along with the position of the stakeholders also needs to be considered to analyze the future position of the company.... The rise of IT and overdependence of the business organizations on the use of IT and networking has made this industry more....
22 Pages (5500 words) Assignment

Risk Assessment for the Pharmacy

A recent example is the hacking of wiki leaks site which affected the entire world furthermore influenced strategic and financial relations between nations as different classified documents were spilled out from the site.... This report "Risk Assessment for the Pharmacy" discusses data security hazard assessment of the pharmacy....
8 Pages (2000 words) Report

Role of Security Automation Systems in Oil and Gas Industry

t is recommended to adopt Stateful inspection of firewalls in order to study the information received from external sources.... This review ''Role of Security Automation Systems in Oil and Gas Industry'' discusses the key role of such security automation systems in securing data in the oil and gas industry....
8 Pages (2000 words) Literature review

CERT Australia Network Threat Risk Assessment

It coordinates with the Cyber Security Operations Center to give situational awareness, developing cybersecurity crisis management plans, conducting cybersecurity tests, and enhancing coordination between government, private business, national and international players (Australia, 2012)....
14 Pages (3500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us