Data Security

User Generated

U3YY0

Business Finance

Description

Assignment: Min of 1300 words with three scholar references in APA format.

1. Identify and discuss the type of firewall architectures that are in use in your home, school, or place of employment.

2. Describe the four types of authentication mechanisms.

3. Describe an authentication mechanism with which you have familiarity that verifies the user's identity by means of a password, passphrase, PIN or other unique authentication code.

4. Explain why many reliable, effective biometric systems are perceived as being somewhat intrusive by users.

5. Describe stateful inspection firewalls and explain how tables track the state and context of each exchanged packet.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DATA SECURITY IN INSTITUTIONS

DATA SECURITY IN INSTITUTIONS
Name:
Institution affiliation:
Date:

1

DATA SECURITY IN INSTITUTIONS

2

QUESTION 1
Packet filter firewalls
Packet filtering firewalls are the initial or original type of firewalls. They function or
operate within line at points of junction, a place where devices such as switches and routers work.
However, packet filter firewalls do not route packets but it makes a comparison between the
received packet to standard criteria such as port number, packet type, allowed IP addresses etc.
The packets that are identified to be troublesome are normally flagged and dropped i.e. they cease
to exist. In addition, packet filter firewalls are cheap and it affects the network performance less
(Snyder, 2010).
This type of firewall uses the default rule system where two things are observed i.e. ease
of use where all traffic is permitted unless it is explicitly denied and security first which states that
deny all traffic unless explicitly allowed by a given rule. This firewall has the capability of
examining the information currently present in an IP header & TCP header.

Circuit-level gateways
These are the devices that identify any malicious content by monitoring the TCP
handshakes through the network. These firewalls monitor the network that is established between
remote and the local hosts to identify if the initiated session is legitimate and if the remote system
can be trusted. However, this firewall does not inspect the packets. This type of firewall
architecture does not interfere with the network performance in any way. Also, its serves are
limited since it allows for accommodation of several protocols. Additionally, this type of firewall

DATA SECURITY IN INSTITUTIONS

3

has a highest and the best security level when compared to it...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags