• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

February 14, 2024 by David Lanter 6 Comments

Filed Under: 06 - Firewalls Tagged With:

Reader Interactions

Comments

  1. Eyup Aslanbay says

    February 17, 2024 at 8:17 pm

    How can attackers avoid the border firewall?

    Log in to Reply
  2. Yannick Rugamba says

    February 18, 2024 at 2:11 pm

    What capability do you think will be essential for future firewalls?

    Log in to Reply
  3. Ooreofeoluwa Koyejo says

    February 18, 2024 at 7:38 pm

    Can a small organisation achieve security without a firewall configured and included?

    Log in to Reply
  4. Celinemary Turner says

    February 18, 2024 at 8:39 pm

    As an IT Security personnel, If my employer requires my recommendations to select the best firewall to meet our organization’s security needs. What critical factors would I need to consider before giving such advice?

    Log in to Reply
  5. Jon Stillwagon says

    February 18, 2024 at 8:53 pm

    Has a firewall ever dropped all the packets when it is at the final stage of going through each firewall?

    Log in to Reply
  6. Bo Wang says

    February 20, 2024 at 9:28 pm

    Does the firewall have a level of protection?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in