Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
6 Sources
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

ITM437 Information Security: Human, Nature, and Technology Factors

Research Paper Instructions:

Module 2 - Case
SECURITY TECHNOLOGY TOOLS I
Case Assignment
Based on the required reading materials and your own research, prepare a 3- to 5-page paper to discuss the following topic:
What type of firewall would you suggest if you were the Chief Security Officer of a Fortune 500 company (packet filtering, application gateway, circuit gateway, MAC layer, or hybrid) and why?
Different types of firewalls
Your paper should address the following questions and issues that are related to the topic above.
Types of firewalls based on their processing modes.
The kinds of firewalls used in your organization or home.
Assignment Expectations
Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular:
Ability to consolidate ideas from reading materials.
Demonstration of your understanding of information securities from different perspectives.
Application of your understanding of information security in a business or organizational environment.
When your paper is done, send it in.

Research Paper Sample Content Preview:

Security Technology Tools
Name:
Instructor:
Date:
Security Technology Tools
A company chooses what type of protection for the running for their networking products. There exist four different types that are packet filtering, application gateway, layering and hybrid system. The advantages will come on the cost of installing, maintenance of the system and duration it can last (Shebanow & Perez, 2012). These are the questions that an organization’s security officer would ask himself or herself before they decide on how to handle the security issues in their companies. For this paper, the analysis of the different security systems is detailed and a recommendation of the best to take for a company.
In the circuit level gateway, the process of transmitting information from one system to another through what is called a “handshake.â€Β This handshake has three parts which start from asking for information by one system, acknowledging the requested information and replying to the queried information. At this handshake, computers are at threat from hackers (Shebanow & Perez, 2012). They do change the system and make it easy for them to get information that they need from them. They can modify the destination and tamper with the acknowledgment of the requests. When that happens, networks become hidden. Computer and company users will struggle in getting information from the system (Stewart, 2014).
Application gateways are closer in similarity to the circuit. The different is the applications that drive the computers. Through the applications, they run their network systems and information flow. Through a website proxy and address configurations, they can block some sites from transmitting information. The information that pass takes time as the only way they would be configured is manual. This type of security stops any malicious attacks and programming.
Packet filtering is another kind of application. The information that is fed into a system of the network is checked by the system to protect the machines from any malicious one. It is important to note that they are the commonly called routers. They have different layers under which they will work to protect the computers (Puni, 2002). Common are layers three and four which will either pass or halt the destinations. Hackers are wise and can interfere with how the levels are programmed. They change the rules that allow or deny passage of information. When that passes, they can access a dangerous website, hack them and even company’s databases (Puni, 2002). That is hazardous to the people.
Finally, the hybrid will encompass more than one type of firewall security to protect the company’s computers. It will combine the proxy, filtering, the commands and restrictions to reach the protection of machines in business. The other types of firewalls have straight way of securing the company. Hackers can predict the way in which they ar...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!