Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
No Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Enterprise Firewall Selection

Essay Instructions:

Assignment:
You’ve been asked by your CIO to research and compare 2 Enterprise level Firewall appliances and give your recommendation on 1 of them for purchase. Price is not a concern as long as it meets practical requirements and supports Enterprise functions, e.g., VPN, Remote Users, malware threat defense.
Submission Format:
This assignment should be submitted in two parts.​
1.) Spreadsheet with comparative analysis (functionality, price, specifications, etc..) for the 2 firewalls. Be sure this is neatly printed. Points will be deducted.
2.) Document which contains no less than 5 thorough paragraphs:
a. 2 paragraphs discussing what a Firewall is, and how it will benefit the Organization.
b. Firewall Name - description
c. Firewall Name - description
d. Final recommendation and supporting reasoning. Be confident in your recommendation!

Essay Sample Content Preview:

STUDENT NAME:
INSTRUCTOR:
COURSE:
TOPIC: Enterprise Firewall selection
DATE:
A firewall is a computer hardware or software used to filter out viruses, worms and even hackers. It increases the level of security for your computer or database from unauthorized external invasion. The firewall acts as the screening point in the network where all communications between the different systems should pass through before being allowed to reach their intended point after being granted access. Otherwise, it will not be granted access to another system. Therefore, firewalls act like a filter between your computer or network and the Internet. You could define what you would filter out and what is allowed to pass through the security device.
Several methods do exist in granting or denying access past the firewall and even some can be combined to provide better reliable security system. These firewall techniques operate at different levels of the network thereby determining the specific filtering options in the network/system. The conventional firewall techniques would include
1 Packet filter: This technique operates by scrutinizing each packet data sent into and out of the system. Depending on the defined rules or instructions, the packet data may be allowed into/out of the system or either rejected. The technique is often effective but is difficult to configure and has high vulnerability to IP spoofing.
2 Application Gateway: This technique applies user-defined mechanisms to given applications like File Transfer Protocol (FTPs) and the Terminal emulation programs (Telnet) servers. It has a high efficiency but you would compromise on the system performance.
3 Circuit-Level Gateways: The circuit-level gateway technique activates a security mechanism whenever a Transfer Control Protocol (TCP) or even User Datagram Protocol (UDP) connection has been established. Once the access has been granted, the data packets can flow through the system freely without subsequent checking.
4 Proxy Server: The proxy server technique usually intercepts all data that may be getting into or leaving the network or system. It also hides the real network addresses.
5 Next-Generation Firewall (NGFW): This technique is in response to the sophistication of malware and recent applications. It can extract information from the external systems and make improved decisions. This technique is very effective in the different levels as it has the capability to enforce the set policies or instructions at the application layer without involving the port and the protocol.
A firewall is important to any organization or system as it has the following uses:
1 It helps protect the system against unwanted programs
2 It also protects classified information from unauthorized access or use
3 It reduces chances of phishing
Consider these two firewall appliances: the Dell SonicWall E-Class Network Security Appliance and the Meraki MX firewall appliance. Both firewall appliances are applying the next generation firewall technique as a security measure.
Meraki MX Firewall Appliance: It is produced by the Cisco Company. It has a centralized management system in that a widespread network can be distributed and managed from a given single point. ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!