• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2022 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Equifax Data Breach
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook
  • Zoom

My question to discuss with my classmates

February 10, 2022 by Jose Gomez 33 Comments

Filed Under: 06 - Firewalls Tagged With:

Reader Interactions

Comments

  1. Kelly Sharadin says

    February 11, 2022 at 5:40 pm

    What are some of the filtering methods firewalls use?

    Log in to Reply
    • Madalyn Stiverson says

      February 15, 2022 at 6:27 pm

      Firewalls can use a few different methods of filtering such as packet filtering and dynamic packet filtering.

      Packet filtering looks at the source and destination IP address, protocols, and ports and determines if it should block or accept the network traffic.

      Dynamic packet filtering looks at the state of active connections and uses that information to determine what traffic it should let through.

      Log in to Reply
    • kofi bonsu says

      February 15, 2022 at 6:53 pm

      Hello Kelly,
      I like your question because types of Firewall Filtering Technologies Basic firewalls provide protection from untrusted traffic while still allowing trusted traffic to pass through. Packet filters, proxy filters, and stateful packet filters are some of the technologies used to accomplish this protection of assets.

      Log in to Reply
  2. Andrew Nguyen says

    February 12, 2022 at 6:24 pm

    What are the pros and cons of using a ‘most-specific wins’ conflict resolution in security policies?

    Log in to Reply
    • Patrick Jurgelewicz says

      February 15, 2022 at 10:07 pm

      In most cases, applying the “most specific wins” conflict resolution tactic is an adequate and flexible solution. A critical problem of this approach is that specificity may not always be defined for conflicting authorizations, for a variety of reasons.

      Log in to Reply
    • Michael Jordan says

      February 15, 2022 at 11:33 pm

      Andrew,

      This is a great question. Personally, I think that a major pro of a “most-specific wins” conflict resolution policy is that manually created policies may be more specific than commonly used or template policies, but these two types of policies may both be present in an overall security policy. Even though policies should be audited to make sure this is not the case, the user-created policy will likely take precedence because I would expect it to be more specific.

      A con to a “most-specific wins” conflict resolution is that it is not as secure as a deny-override policy. In a deny-override policy, if someone really needs access to something they are denied privileges from, it is usually pretty easy to grant them these privileges. It is not as easy to detect misuse of overprivileged users.

      -Mike

      Log in to Reply
  3. Patrick Jurgelewicz says

    February 12, 2022 at 11:40 pm

    What are some difficult problems that can create long-term challenges for firewalls?

    Log in to Reply
  4. kofi bonsu says

    February 13, 2022 at 3:03 am

    The question that I would like to pose to my classmates is what is a major difference between rules set up using the direct interface and rich language?

    Log in to Reply
  5. zijian ou says

    February 13, 2022 at 3:18 am

    What does a firewall do if it cannot keep up with the traffic volume?

    Log in to Reply
    • Kelly Sharadin says

      February 13, 2022 at 4:20 pm

      If a firewall cannot handle an increase in traffic – the firewall will drop all incoming traffic. This is similar to a DoS attack.

      Log in to Reply
  6. Madalyn Stiverson says

    February 13, 2022 at 11:10 am

    What are the most common types of firewalls?

    Log in to Reply
    • Vraj Patel says

      February 15, 2022 at 7:28 pm

      Hello Madalyn,
      There few of the most common firewalls are Hardware Firewall, Software Firewall, Stateful Inspection Firewall, Packet Filtering Firewall, and a Next-Generation Firewall.

      Log in to Reply
    • Kyuande Johnson says

      February 16, 2022 at 9:54 am

      Hello Madalyn,
      The Most Common Type of Firewalls are:

      Packet-filtering firewalls
      Proxy firewalls
      NAT firewalls
      Web application firewalls
      Next-gen firewalls (NGFW)

      Log in to Reply
  7. Dhaval Patel says

    February 13, 2022 at 1:10 pm

    What is the purpose of deep packet inspection?

    Log in to Reply
    • Victoria Zak says

      February 14, 2022 at 9:23 pm

      Hi Dhaval,

      The purpose of a deep packet inspection is to evaluate the data and header part of a packet that is transmitted through an inspection point, getting rid of any non-compliance to protocol, spam, viruses, intrusions, and any other defined criteria to block the packet from passing through the inspection point.

      Log in to Reply
    • Madalyn Stiverson says

      February 15, 2022 at 6:30 pm

      Deep packet filtering evaluates the contents of a packet that is passing through the firewall. It checks the contents in order to figure out where it came from and what application or service sent it. It can find and redirect network traffic from specific websites or from a particular IP address.

      Log in to Reply
  8. Olayinka Lucas says

    February 13, 2022 at 3:21 pm

    As an IT Security personnel, my recommendations may be required by my employer in selecting the best firewall to meet the security needs of our organization. What are the critical factors I would need to consider before giving such advice?

    Log in to Reply
    • Kelly Sharadin says

      February 13, 2022 at 4:19 pm

      I would identify the following critical factors; what is the organization’s size, budget for cybersecurity, what type of services does the organization provide (ex. web server, ftp, e-commerce?), and whether the workforce is on-prem, hybrid of remote.

      Log in to Reply
  9. Michael Jordan says

    February 13, 2022 at 6:30 pm

    If one company (a) acquires another company (b) via buyout or merger, how are the information systems merged in a such a way that the same firewall rules/policies for company a are applied to the information systems purchased from company b? Is it more common to keep the information systems separate with separate policies, or to merge them and try to assimilate the new information system and firewall policies?

    Log in to Reply
  10. Vraj Patel says

    February 13, 2022 at 8:54 pm

    What does the firewall do to the packets received that can’t be identified as a valid or suspicious packet?

    Log in to Reply
    • Antonio Cozza says

      February 13, 2022 at 11:05 pm

      The firewall should drop the suspicious packets and assume they are malicious if they cannot be validated as packets with integrity.

      Log in to Reply
    • Michael Jordan says

      February 15, 2022 at 11:39 pm

      Typically, all other packets besides provable attack packets will be allowed through the firewall.

      Log in to Reply
  11. Victoria Zak says

    February 13, 2022 at 11:05 pm

    Why are firewall policies important?

    Log in to Reply
    • zijian ou says

      February 15, 2022 at 7:05 am

      The firewall initially rejects all unauthorized network connections. As a result, it protects your data from being stolen. This is especially important when protecting sensitive information, such as passwords and online banking credentials.

      Log in to Reply
    • Vraj Patel says

      February 15, 2022 at 7:45 pm

      Hello Victoria,
      The firewall policies are important as it states what the purpose of that particular firewall. As if it’s been places before some application then it should only allow the specific types of traffic using particular ports. If that application is used for internal use only then it should allow traffic from internal network only and block the rest. As well as it would also includes the types of ports and the range of IP address that it should allow the traffic to enter in the from the outside of the network.

      Log in to Reply
  12. Antonio Cozza says

    February 13, 2022 at 11:09 pm

    Why are border firewalls considered ineffective and “dead” today?

    Log in to Reply
    • Patrick Jurgelewicz says

      February 15, 2022 at 10:02 pm

      A problem with border firewalls is that many attackers can avoid firewall filtering by avoiding the border firewall completely. Many attackers are internal to a firm, an internal host may be compromised, or wireless LANs could allow a hacker to enter the network through an access point.

      Log in to Reply
  13. Dan Xu says

    February 13, 2022 at 11:47 pm

    What can firewalls protect against? How long does a firewall last?

    Log in to Reply
    • Kyuande Johnson says

      February 16, 2022 at 9:55 am

      Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet.

      Regardless of the manufacturer, you should replace any firewall that’s 8-10 years old.

      Log in to Reply
  14. Lauren Deinhardt says

    February 15, 2022 at 1:40 am

    What is the difference between intra-policy conflicts and inter-policy conflicts?

    Log in to Reply
    • Madalyn Stiverson says

      February 15, 2022 at 6:38 pm

      Intra policy conflicts exist within a single policy, whereas interpolicy conflicts exist within at least two policies. These policies can be redundant, contradictory, or irrelevant.

      Log in to Reply
  15. Lauren Deinhardt says

    February 15, 2022 at 1:46 am

    https://www.cnn.com/2022/02/13/us/49ers-network-security-incident/index.html

    San Francisco 49ers confirm network security incident; ransomware gang claims responsibility

    Cybercriminals do not stop for Superbowl Sunday. This past Sunday, it was discovered that the NFL San Francisco 49ers suffered a network security incident. This was as result of a ransomware hack, using ransomware software called ‘BlackByte’. BlackByte follows a ‘ransomware as a service’ (RaaS) model, where the ransomware owner sells access to the script through the dark web. BlackByte has been used to successfully target organizations from sectors ranging from sports to agriculture, and the RaaS model is certainly a strong contributor in how widespread it is. The 49ers announced that the attack was limited to their internal IT servers, not involving fans or stadium infrastructure.

    Log in to Reply
  16. Kyuande Johnson says

    February 16, 2022 at 9:52 am

    What are the difference between Stateful and Stateless Firewalls.
    What are the major Pros and Cons in Implementing these types of firewalls?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in