MIS 5214 - Section 001 - David Lanter
February 10, 2022 by Jose Gomez 33 Comments
Kelly Sharadin says
February 11, 2022 at 5:40 pm
What are some of the filtering methods firewalls use?
Madalyn Stiverson says
February 15, 2022 at 6:27 pm
Firewalls can use a few different methods of filtering such as packet filtering and dynamic packet filtering.
Packet filtering looks at the source and destination IP address, protocols, and ports and determines if it should block or accept the network traffic.
Dynamic packet filtering looks at the state of active connections and uses that information to determine what traffic it should let through.
kofi bonsu says
February 15, 2022 at 6:53 pm
I like your question because types of Firewall Filtering Technologies Basic firewalls provide protection from untrusted traffic while still allowing trusted traffic to pass through. Packet filters, proxy filters, and stateful packet filters are some of the technologies used to accomplish this protection of assets.
Andrew Nguyen says
February 12, 2022 at 6:24 pm
What are the pros and cons of using a ‘most-specific wins’ conflict resolution in security policies?
Patrick Jurgelewicz says
February 15, 2022 at 10:07 pm
In most cases, applying the “most specific wins” conflict resolution tactic is an adequate and flexible solution. A critical problem of this approach is that specificity may not always be defined for conflicting authorizations, for a variety of reasons.
Michael Jordan says
February 15, 2022 at 11:33 pm
This is a great question. Personally, I think that a major pro of a “most-specific wins” conflict resolution policy is that manually created policies may be more specific than commonly used or template policies, but these two types of policies may both be present in an overall security policy. Even though policies should be audited to make sure this is not the case, the user-created policy will likely take precedence because I would expect it to be more specific.
A con to a “most-specific wins” conflict resolution is that it is not as secure as a deny-override policy. In a deny-override policy, if someone really needs access to something they are denied privileges from, it is usually pretty easy to grant them these privileges. It is not as easy to detect misuse of overprivileged users.
February 12, 2022 at 11:40 pm
What are some difficult problems that can create long-term challenges for firewalls?
February 13, 2022 at 3:03 am
The question that I would like to pose to my classmates is what is a major difference between rules set up using the direct interface and rich language?
zijian ou says
February 13, 2022 at 3:18 am
What does a firewall do if it cannot keep up with the traffic volume?
February 13, 2022 at 4:20 pm
If a firewall cannot handle an increase in traffic – the firewall will drop all incoming traffic. This is similar to a DoS attack.
February 13, 2022 at 11:10 am
What are the most common types of firewalls?
Vraj Patel says
February 15, 2022 at 7:28 pm
There few of the most common firewalls are Hardware Firewall, Software Firewall, Stateful Inspection Firewall, Packet Filtering Firewall, and a Next-Generation Firewall.
Kyuande Johnson says
February 16, 2022 at 9:54 am
The Most Common Type of Firewalls are:
Web application firewalls
Next-gen firewalls (NGFW)
Dhaval Patel says
February 13, 2022 at 1:10 pm
What is the purpose of deep packet inspection?
Victoria Zak says
February 14, 2022 at 9:23 pm
The purpose of a deep packet inspection is to evaluate the data and header part of a packet that is transmitted through an inspection point, getting rid of any non-compliance to protocol, spam, viruses, intrusions, and any other defined criteria to block the packet from passing through the inspection point.
February 15, 2022 at 6:30 pm
Deep packet filtering evaluates the contents of a packet that is passing through the firewall. It checks the contents in order to figure out where it came from and what application or service sent it. It can find and redirect network traffic from specific websites or from a particular IP address.
Olayinka Lucas says
February 13, 2022 at 3:21 pm
As an IT Security personnel, my recommendations may be required by my employer in selecting the best firewall to meet the security needs of our organization. What are the critical factors I would need to consider before giving such advice?
February 13, 2022 at 4:19 pm
I would identify the following critical factors; what is the organization’s size, budget for cybersecurity, what type of services does the organization provide (ex. web server, ftp, e-commerce?), and whether the workforce is on-prem, hybrid of remote.
February 13, 2022 at 6:30 pm
If one company (a) acquires another company (b) via buyout or merger, how are the information systems merged in a such a way that the same firewall rules/policies for company a are applied to the information systems purchased from company b? Is it more common to keep the information systems separate with separate policies, or to merge them and try to assimilate the new information system and firewall policies?
February 13, 2022 at 8:54 pm
What does the firewall do to the packets received that can’t be identified as a valid or suspicious packet?
Antonio Cozza says
February 13, 2022 at 11:05 pm
The firewall should drop the suspicious packets and assume they are malicious if they cannot be validated as packets with integrity.
February 15, 2022 at 11:39 pm
Typically, all other packets besides provable attack packets will be allowed through the firewall.
Why are firewall policies important?
February 15, 2022 at 7:05 am
The firewall initially rejects all unauthorized network connections. As a result, it protects your data from being stolen. This is especially important when protecting sensitive information, such as passwords and online banking credentials.
February 15, 2022 at 7:45 pm
The firewall policies are important as it states what the purpose of that particular firewall. As if it’s been places before some application then it should only allow the specific types of traffic using particular ports. If that application is used for internal use only then it should allow traffic from internal network only and block the rest. As well as it would also includes the types of ports and the range of IP address that it should allow the traffic to enter in the from the outside of the network.
February 13, 2022 at 11:09 pm
Why are border firewalls considered ineffective and “dead” today?
February 15, 2022 at 10:02 pm
A problem with border firewalls is that many attackers can avoid firewall filtering by avoiding the border firewall completely. Many attackers are internal to a firm, an internal host may be compromised, or wireless LANs could allow a hacker to enter the network through an access point.
Dan Xu says
February 13, 2022 at 11:47 pm
What can firewalls protect against? How long does a firewall last?
February 16, 2022 at 9:55 am
Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet.
Regardless of the manufacturer, you should replace any firewall that’s 8-10 years old.
Lauren Deinhardt says
February 15, 2022 at 1:40 am
What is the difference between intra-policy conflicts and inter-policy conflicts?
February 15, 2022 at 6:38 pm
Intra policy conflicts exist within a single policy, whereas interpolicy conflicts exist within at least two policies. These policies can be redundant, contradictory, or irrelevant.
February 15, 2022 at 1:46 am
San Francisco 49ers confirm network security incident; ransomware gang claims responsibility
Cybercriminals do not stop for Superbowl Sunday. This past Sunday, it was discovered that the NFL San Francisco 49ers suffered a network security incident. This was as result of a ransomware hack, using ransomware software called ‘BlackByte’. BlackByte follows a ‘ransomware as a service’ (RaaS) model, where the ransomware owner sells access to the script through the dark web. BlackByte has been used to successfully target organizations from sectors ranging from sports to agriculture, and the RaaS model is certainly a strong contributor in how widespread it is. The 49ers announced that the attack was limited to their internal IT servers, not involving fans or stadium infrastructure.
February 16, 2022 at 9:52 am
What are the difference between Stateful and Stateless Firewalls.
What are the major Pros and Cons in Implementing these types of firewalls?
You must be logged in to post a comment.