• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.703 ■ Spring 2022 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

February 9, 2022 by David Lanter 42 Comments

Filed Under: 06 - Firewalls Tagged With:

Reader Interactions

Comments

  1. Michael Galdo says

    February 11, 2022 at 3:02 pm

    What is the difference between IPS and IDS?

    Log in to Reply
    • Yangyuan Lin says

      February 11, 2022 at 6:38 pm

      The main difference between them is that IDS is a monitoring system, while IPS is a control system. IDS doesn’t alter the network packets in any way, whereas IPS prevents the packet from delivery based on the contents of the packet, much like how a firewall prevents traffic by IP address.

      Log in to Reply
      • Mohammed Syed says

        February 13, 2022 at 11:29 pm

        In addition, the intrusion prevention and intrusion detection system are network security/threat prevention technology. IPS investigate network traffic flows to detect and prevent vulnerability exploits. An Intrusion detection system is a passive system that scans traffic and reports back on threats and sends an alarm to the administrator, dropping the malicious packet.

        Log in to Reply
        • Amelia Safirstein says

          February 15, 2022 at 12:03 pm

          Additionally, there are positives and negatives to using IDS vs IPS. IPS helps to respond to attacks more quickly and can block them before they actually enter the network. On the other hand, false positives in IPS can block legitimate traffic.

          Log in to Reply
  2. Yangyuan Lin says

    February 11, 2022 at 6:27 pm

    What is the effective mitigation method when there are loopholes, exceptions, or attacks (DDoS) on the firewall?

    Log in to Reply
  3. Matthew Bryan says

    February 12, 2022 at 12:07 pm

    How should organization’s deal with false positive alerts from IDS/IPS systems? Should every alert be investigated? What steps can be taken to make an IDS/IPS less “noisy”?

    Log in to Reply
    • Bryan Garrahan says

      February 13, 2022 at 2:38 pm

      Vetting the large of volume IDS/IPS system transactions in most organizations is exhausting and typically does not provide much value to security. It’s really not feasible to review each and every transaction from a resource perspective. In order to cut down on the number of false positives organizations should review the traffic rule configuration(s) on the system periodically to ensure they accurately filtering/blocking the correct traffic instances. Additionally, changes in technologies, for example the operating system, could occur over time so reviewing the rule configurations would help an organization make adjustments to the IDS/IPS traffic rules accordingly.

      Log in to Reply
      • Amelia Safirstein says

        February 15, 2022 at 11:59 am

        Absolutely, The IDS/IPS rules take a while to fine-tune when initially setting up the system and then should be reviewed regularly and reconfigured as needed. Too many false positives can cause the team to miss true, important issues.

        Log in to Reply
  4. Elizabeth Gutierrez says

    February 12, 2022 at 6:48 pm

    What security roles do internal firewalls play as compared to host firewalls? Why are both types necessary when securing a network?

    Log in to Reply
    • Shubham Patil says

      February 12, 2022 at 11:10 pm

      Internal firewalls help minimizing the attack surface using micro-segmentation, which divides the network into granular zones that are secured separately
      Using intelligent automation to deploy and update security policies based on “known good” behavior. A host-based firewall is a piece of firewall software that runs on an individual computer or device connected to a network. These types of firewalls are a granular way to protect the individual hosts from viruses and malware, and to control the spread of these harmful infections throughout the network. Both of the firewalls are necessary to implement Defense in Depth strategy, multiple security measures to protect the integrity of information. This way of thinking is used to cover all angles of business security – intentionally being redundant when necessary. If one line of defense is compromised, additional layers of defense are in place to ensure that threats don’t slip through the cracks. This method addresses the security vulnerabilities that inevitably exist in technology, personnel, and operations within a network.

      Log in to Reply
  5. Shubham Patil says

    February 12, 2022 at 11:00 pm

    What does a firewall do if it cannot keep up with the traffic volume?

    Log in to Reply
    • Oluwaseun Soyomokun says

      February 13, 2022 at 3:31 pm

      It will drop all packets because it becomes overloaded with volume of packets it cannot process during the filtering process.

      Log in to Reply
    • Miray Bolukbasi says

      February 18, 2022 at 8:25 am

      Hi Shubham, if the firewall cannot keep up with the traffic volume, it won’t be able to process further steps and end up dropping all the packets.

      Log in to Reply
  6. Jason Burwell says

    February 13, 2022 at 10:30 am

    How often should the Firewall Log File be checked/looked into?

    Log in to Reply
    • Matthew Bryan says

      February 13, 2022 at 12:10 pm

      Firewall logs should be reviewed daily, if not multiple times each day. This is the most labor intensive part of firewall management per Boyle and Panko. The goal of reviewing firewall logs is to identify unusual traffic patterns. An administrator can look for the top-ten source IP addresses whose packets were dropped, compare DNS failures to previous points in time, etc. Completing this daily helps the organization to detect threats early and work to address them.

      Log in to Reply
      • Oluwaseun Soyomokun says

        February 13, 2022 at 3:39 pm

        I agree with you. Firewall logs needs to be reviewed daily and properly given priority of escalation, should there be something to be flagged. Such as the DoS Attacks traffic passing through with maximum speed.

        Log in to Reply
  7. Bryan Garrahan says

    February 13, 2022 at 2:52 pm

    Is the deployment of a single border firewall enough to keep an organization protected? If not, what threats/risks do they face?

    Log in to Reply
    • Amelia Safirstein says

      February 15, 2022 at 11:54 am

      Deployment of a single border firewall is not enough to keep an organization protected. Bad actors can send encrypted packets to get past firewalls, find misconfiguration or weakness in a particular firewall, etc. No border firewall can be trusted to give 100% protection. Without any additional internal protection, it would be a nightmare for the organization once a hacker got past the border firewall.

      Log in to Reply
  8. Oluwaseun Soyomokun says

    February 13, 2022 at 3:41 pm

    What is unified threat management described in the Boyle and Panko?

    Log in to Reply
    • Elizabeth Gutierrez says

      February 14, 2022 at 6:33 pm

      Hi Oluwaseun,
      While uncommon today, unified threat management (UTM) combines traditional firewall filtering with many forms of filtering, including antivirus and spam filtering. Since the approach embraces both traditional filtering methods and anti-virus filtering, it only has the processing power to be used in smaller firms or branch offices of larger firms.

      Log in to Reply
      • Oluwaseun Soyomokun says

        February 15, 2022 at 12:43 pm

        Hi Elizabeth,
        You are right about unitfied threat management (UTM) combines layered supports such as the anti-virus, anti-spyware and more of network firewalling tool, intrusion detection software and intrusion prevention to ffilter and solve network related security issues for securing organization assets.

        Log in to Reply
  9. Ryan Trapp says

    February 13, 2022 at 3:53 pm

    Most corporate border firewalls are stateful firewalls. Is there a situation where it would be best to use a stateless firewall?

    Log in to Reply
    • Mohammed Syed says

      February 13, 2022 at 11:19 pm

      yes, we can use a stateless firewall for small businesses but the main goal is to protect systems, company documents safe from Attackers. Stateless firewalls are designed to protect networks based on static information such as source and destination.

      Log in to Reply
  10. Corey Arana says

    February 13, 2022 at 5:29 pm

    What is the DMZ?

    Log in to Reply
    • Mohammed Syed says

      February 13, 2022 at 10:55 pm

      I think you missed reading part 6.8 section in the firewall chapter, the Demilitarized zone is a subnet that contains all of the servers and applications proxy firewalls accessible via the internet.

      Log in to Reply
      • Alexander William Knoll says

        February 15, 2022 at 9:24 pm

        Adding on to what Mohammed said, they exist to add an additional layer of security to an organization’s local area connection, as the external network node (internet) is only able to access what is exposed in the DMZ. It gets its name from “demilitarized zone”, think the area between North/South Korea during the Korean War which was a ‘neutral’ zone.

        Log in to Reply
        • Miray Bolukbasi says

          February 18, 2022 at 8:29 am

          It is interesting to see real geographic location naming network piece of security as Mohammed refers. I think it’s clever to name isolated networks between the Internet and private network as DMZ. It refers to the North/South Korea area in which military action was not permitted.

          Log in to Reply
  11. Ornella Rhyne says

    February 13, 2022 at 10:07 pm

    Is there other measures or methods outside of a firewall that can help secure a network?

    Log in to Reply
    • Ryan Trapp says

      February 15, 2022 at 11:30 am

      Hi Ornella,

      Yes, absolutely. A firewall is a great tool on the border between the company’s network and the internet to help prevent unwanted traffic. However, there are other tools that can help secure a network. A company can implement an IPS to protect the network from specific attacks. They can also use an IDS to help detect certain attacks and have the incident response team respond to them promptly.

      Log in to Reply
    • Miray Bolukbasi says

      February 18, 2022 at 8:34 am

      Hi Ornella.

      There are several ways to secure a network such as access controls, anti-malware software, application security, network segmentation, password policies, VPN, training, and education. However, as Ryan mentioned I believe a firewall is a great tool to have in place because it provides monitoring of traffic, protection against trojans, hacker presentation, access control, and better privacy. I think it’s great that a single implementation covers more than one piece of security control. But sometimes it might be pricy and complex for organizations.

      Log in to Reply
  12. Hang Nu Song Nguyen says

    February 13, 2022 at 11:05 pm

    Can a packet be changed? If not, please explain why not.

    Log in to Reply
    • Elizabeth Gutierrez says

      February 14, 2022 at 6:17 pm

      Hi Hang,
      I think the only time it is difficult or nearly impossible to modify packets would be in the packet assembly stage. Otherwise, certain programs are available to edit already created or captured packets and strip them of their headers. From my understanding, a man-in-the-middle attack also has the capacity of intercepting communications between two parties and/or modifying traffic.

      Log in to Reply
      • Ryan Trapp says

        February 15, 2022 at 11:37 am

        Hi Elizabeth,

        I agree with your point. I would also add that as long as the packet has been encrypted, the contents are not able to be changed. However, it depends on what level the packet is encrypted at. For example, if you have an SSL/TLS encryption being used then the packet could potentially still be modified at the Internet layer. Whereas if you were using an IPSec VPN the packet could not.

        Log in to Reply
  13. Michael Duffy says

    February 13, 2022 at 11:10 pm

    In what environments would an IDPS be implemented instead of an IDS?

    Log in to Reply
  14. Mohammed Syed says

    February 13, 2022 at 11:27 pm

    What are the differences between Palo Alto and Checkpoint firewalls? And which one would you recommend would be best to use if I worked as a Network Architecture for a Hospital?

    Log in to Reply
    • Alexander William Knoll says

      February 15, 2022 at 9:40 pm

      Palo Alto firewalls are most beneficial when features, management, & performance are key factors. Checkpoint has a wide array of security features, making it ideal for a company seeking an integrated approach to complex/hybrid environments. On the plus, Palo Alto is a good choice for all company’s that prioritize management quality/features over price, but can take a performance hit when it is over managed. It also does not have firmware updates often, resulting in massive updates that take a long time to stabilize. Checkpoint firewalls are known for optimizing network performance & efficiently inspecting connections, but have slow technical support and also have unstable firmware issues. Based on my research, I would recommend Palo Alto firewalls, because they have models that are designed specifically to protect patient data while encouraging innovation. They also seem to be more favorable in the healthcare industry when compared to Checkpoint firewalls.

      Log in to Reply
  15. Joshua Moses says

    February 13, 2022 at 11:51 pm

    Are there any protocols that have a problem with NAT? If so can you name one?

    Log in to Reply
  16. Amelia Safirstein says

    February 13, 2022 at 11:54 pm

    What are the pros and cons of using attack signature-based rules vs anomaly detection rules? When would it be beneficial to only use one or the other?

    Log in to Reply
    • Alexander William Knoll says

      February 15, 2022 at 10:08 pm

      The pro of attack signature-based rules is that when an attack signature is identified it can be added to the firewall to easily stop the attack. The downside is that zero-day attacks occur before an attack’s signature is defined, so a firewall cannot stop the attack. A pro of anomaly detection rules is that they detect unusual patterns which may hint to a possible attack, and thus they can stop attacks that have no defined signature. The downside is that they are too inaccurate, generating too many false positives to be viable for most companies. A time it would be beneficial to use only anomaly detection rules is when the goal is to search for hard to find significant events such as fraud or network intrusion.. On the other hand, it would be beneficial to strictly use attack signature-based rules when familiar attacks are the most common occurrence.

      Log in to Reply
  17. Alexander William Knoll says

    February 14, 2022 at 10:41 pm

    What is the reasoning behind UTM firewalls being “good in one area and lacking in others”?

    Log in to Reply
  18. Miray Bolukbasi says

    February 18, 2022 at 8:03 am

    Where does a firewall fit in the security model?

    Log in to Reply
  19. Corey Arana says

    April 20, 2022 at 6:00 pm

    What is the difference between firewalls and IDS’s?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in