IT System Essay

User Generated

nfzd

Computer Science

Description

As preparation, you should read the following:

https://joshua14.homelinux.org/blog/?p=1392

In a written analysis of the above commands and processes, discuss how you might defeat the firewall of a school or organization and describe how you would accomplish this from both inside and outside of the organization. Include any recommendations to the school or organization to improve its defense. Why is this knowledge important to the ethical hacker?

Your paper should be 4-5 pages in length, not including the title and references pages, and should cite at least three scholarly resources other than the course materials. It should follow the academic writing standards and APA style guidelines.

It is strongly encouraged that you submit all assignments to the Turnitin Originality Check prior to submitting it to your instructor for grading. The similarity should be less than 20% in total.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: IT SYSTEMS

1

IT Systems Essay
Student’s Name:
Institution:

IT SYSTEMS

2
IT Systems Essay
Introduction

Defending information technology systems allows an organization to deal with
various challenges that might threaten the security of its data and other assets. Further, it is
vital for companies and organizations to secure their servers to prevent any unwanted access
that might compromise their systems. A firewall creates appropriate restrictions from
unauthorized sources to ensure a networked system is not threatened by hackers at any given
time. This requires a firm to strengthen all its ports to prevent different types of people from
accessing its systems at any given time. Thus, by adopting appropriate tools, a firm can be
capable of making its networks stronger to safeguard its data from leaking to third parties at
any given period. In this paper, the discussion highlights some system vulnerabilities and
how they can be handled in a school’s network to enhance its overall performance in the
long-term.
Discussion
The firewall of the school can be bypassed in different ways. Firstly, the use of
various tools that enable external users to find accessible ports makes it easy for a person to
breach the internal systems of an organization. In this regard, the person who is unauthorized
can send packets to different hosts behind the firewall and obtain the information he or she
needs at that time. In some cases, the use...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags