Access over 20 million homework & study documents

Network Security

Content type
User Generated
Subject
Computer Science
School
California College-San Diego
Type
Homework
Rating
Showing Page:
1/3
Running Head: NETWORK SECURITY 1
Network Security
Institutional Affiliations
Name
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
NETWORK SECURITY 2
Network Security
Introduction
Firewalls and VPNs have been used a lot in various areas to enforce network security. Network
administrators should be able to design a secure network using firewalls and VPNs. This means a
network administrator should be able to choose a good firewall, install it and manage it.
Firewalls
Firewalls rely on rules to enforce security in a network. This rules can be referred to as Access
Control List (ACL) since they are used as a filter. They determine whether the network traffic to
go through or to be blocked. This means network administrator should know what to block and
what to allow then do planning by writing the rules before enforcing them. It is always a good
idea to use a restrictive mode (block by default) where you block everything then allow what you
are using. This helps to minimize the number of open ports and devices which are exposed to the
network.
It is important to follow best practices when dealing with firewalls. This involves creating
firewall policies, hardening the firewall, improving the performance of firewall, logging, and
monitoring, having security in-depth setup and others. Therefore, it is always a good idea to
choose a firewall with the required features. You have to take into consideration factors such as
performance, limitations, reliability, and others. Network administrators should be
knowledgeable on how to set up DMZ in the network for added security. It is also good to utilize
intrusion detection systems and other monitoring tools in the network.
Port forwarding and NAT are features which can be utilized in firewalls as part of security
through obscurity. This feature allows the use of a single an external address to multiple internal

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Running Head: NETWORK SECURITY 1 Network Security Institutional Affiliations Name Date NETWORK SECURITY 2 Network Security Introduction Firewalls and VPNs have been used a lot in various areas to enforce network security. Network administrators should be able to design a secure network using firewalls and VPNs. This means a network administrator should be able to choose a good firewall, install it and manage it. Firewalls Firewalls rely on rules to enforce security in a network. This rules can be referred to as Access Control List (ACL) since they are used as a filter. They determine whether the network traffic to go through or to be blocked. This means network administrator should know what to block and what to allow then do planning by writing the rules before enforcing them. It is always a good idea to use a restrictive mode (block by default) where you block everything then all ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4