StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Firewalls and Proxy Servers - Essay Example

Cite this document
Summary
Largely due to the failure of our board of directors to understand that investment in network defense systems is an investment in the security of the company's most important asset, its data, our network defense systems are technologically retarded" (ICT Director)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Firewalls and Proxy Servers
Read Text Preview

Extract of sample "Firewalls and Proxy Servers"

Download file to see previous pages

A recent change in leadership has influenced a change in this way of thinking. The ICT Department has been authorized to implement a more effective and efficient network defense system. It is, thus, that we are moving towards the adoption of a Stego defense system. Steganography, also called data hiding, is the art of hiding a covert (hidden) message within an overt file. Steganography can be described as a method to conceal the existence of a message within seemingly innocent material. To perform steganography, two willing parties are necessary.

The sender embeds a covert message within an overt file and sends it to the receiver, who extracts the covert message. The goal of steganography is to hide as much information as possible without it being detected (Judge, 2001). The goal of stego-marking is to embed information in a way that prevents the information from being detected or removed. Stego-marking combines the key qualities of both steganography and digital watermarking (Judge, 2001). Our organization employs both hardware and software firewalls and any solution for enhancing the defense of our network system, or protecting us from the Internet's hostile environment, will operate in conjunction with our firewall system.

At the present moment, we are involved in the implementation of a Stego system to operate in conjunction with our firewall system. In order to better understand how the one will compliment and enhance the other, it is necessary that I overview our operative firewall system.A firewall is a device that sits between two networks, usually the Internet and a corporate network. A firewall drops or allows the passing of packets based on certain conditions (Strassberg, Rollie, and Gondek, 2002).

The filtering done by a firewall is usually based on one of the following:- An IP address that is taken from the IP header- A port number that is taken from the TCP or UDP headerSome firewalls can filter packets according to application data, but most firewalls are not scaled for such filtering (Strassberg, Rollie, and Gondek, 2002). Our firewall system is not scaled for such filtering.Although firewalls are the main attack prevention device in use today, they can only filter packets at a high level.

Firewalls cannot filter packets according to specific types of information in the packets. Firewalls use certain fields, such as IP addresses and port numbers, to determine if a packet should be filtered. These fields are used because they are the only fields considered useful for identifying and preventing attacks (Strassberg, Rollie, and Gondek, 2002). Ours is a packet-filtering firewall system. It has prevented countless intrusion attempts and attacks through the said filtering but, not all.

Indeed, the failure of our firewall system to protect us from worm and virus attacks has, over the years, cost us over two hundred thousand dollars. By complimenting our firewall with a Stego system, our firewall can be used to filter packets based on data in other fields, such as the TCP and IP headers, when stego-marking is used to hide data in those fields.2.2 Stego-MarkingThe figure below depicts our network structure. The public network, or Internet, is shown in red. The semi-public network is shown in yellow.

This network contains systems that must be accessible to the Internet. The internal or private network is shown

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewalls and Proxy Servers Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Firewalls and Proxy Servers Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1522841-firewalls-and-proxy-servers
(Firewalls and Proxy Servers Essay Example | Topics and Well Written Essays - 1250 Words)
Firewalls and Proxy Servers Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1522841-firewalls-and-proxy-servers.
“Firewalls and Proxy Servers Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1522841-firewalls-and-proxy-servers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Firewalls and Proxy Servers

Power point presentation about Firewall Technologies

This is referred to as packet filter firewalls which lays down the foundation of a technology that will further be improved and developed.... The wide popularity and usage of the internet technology in a global scale necessitates the creation of a system which ensures security within a network....
5 Pages (1250 words) Essay

Firewalls Network Security Analysis

The essay "firewalls Network Security Analysis" discusses the implementation of firewall technology for the enhanced security of any business or personal network.... Nevertheless, some experts believe that firewalls are an effective solution to deal with these issues....
6 Pages (1500 words) Essay

Censorship Problem between China and Google

This essay presents the horn between Google and China which started after Google received some highly sophisticated and coordinated hack attack on its overseas servers.... The company said that the attacks were originated from China.... Beside Google, at least 20 other companies were attacked....
5 Pages (1250 words) Essay

Microsoft ISA Server

ISA server is a multi-featured product that can help any organization in a variety of ways and helps in providing a unique system of securing the internet connectivity with incorporated firewalls, VPN servers, and gateway along with a Web proxy.... This feature has an edge for the ISA server with other servers that the installation of the program is without any disruption or interference in the activities of work at the same time security services are also provided (Alexander)....
10 Pages (2500 words) Case Study

Cultural feasibility

It's also possible to have internet Firewalls and Proxy Servers that specifically target dental websites.... From the paper "Cultural feasibility" it is clear that a cultural feasibility study is one that investigates the ethical, social issues in the design and implementation of the project that is under development....
1 Pages (250 words) Assignment

Firewalls: Great Network Security Devices

All the computers connected to a network justify the potential of a firewall, whether it is a desktop system or thousands of servers that create the network of a corporation, a traveling salesperson's laptop connected to the wireless communication network, or someone's new PC with a dial uplink to the web (Mitchell, 2012; Shelly, Cashman, & Vermaat, 2005; Northrup, 2012).... This research paper "firewalls: Great Network Security Devices" presents an overview of the firewall security solution....
9 Pages (2250 words) Research Paper

Multitunneling Grid Transactions

In such a case it happens that firewall knows about the remote machine while my machine knows about firewalls and so trios can be rigged up (Rob, 2001).... … The paper “Multitunneling Grid Transactions” is a meaty variant of a lab report on information technology....
6 Pages (1500 words) Lab Report

Personal Firewalls and Online Armor Personal Firewall Advantages and Disadvantages

The paper "Personal firewalls and Online Armor Personal Firewall Advantages and Disadvantages" is focused on a hardware, software, or a combination of both that is used to monitor and filter traffic going into or leaving a protected or private network, and prevent unauthorized entry into network.... nbsp;… The firewall performs a two-pronged security function of: Filtering of traffic packets based on “accept or deny” policy that is defined by the information security policy Service provision to users within the network through application proxy gateways, while protecting them from malicious users from outside the network....
9 Pages (2250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us