Working individually describe the compression/archive utilities listed below:
• Kerberos
• Firewalls
For Kerberos, discuss the following topics:
• What it is
• Describe the protocol
• Requests and authentications
• Technologies that rely on it
For firewalls, discuss the following topics:
• What they are
• Describe how each generation works
• List and describe different open-source and shareware firewalls
• Compare and contrast the different products you have found
• Pick one product and describe the installation process on Linux Ubuntu
The paper should be formatted using 1inch margins, 1.5 spaces between lines, Times New
Roman font size 12 for the text and size 16 for titles. The title page and list of references will not
count towards the total number of pages. The last page should be at least 50% complete. Turn in
the report in .doc or .docx format.
Cite any references you will use to create the paper. Not citing sources will result in plagiarism.
Also copying and pasting directly from the sources without properly citing will result in
plagiarism. The result of plagiarism is a grade of 0 for the assignment and may lead to
consequences described in the syllabus.
You should use APA-style citation and reference formatting for this paper. You can find
references on how to use the APA style at the following address:
http://cooklibrary.towson.edu/styleGuides.cfm#APA
5
Firewall:
A firewall is a network device, hardware, software, or a combination of the two, whose
purpose is to enforce a security policy across its connections. It is comparable to a wall that has a
window where the wall serves keep things out, except those permitted through the window. A
security policy acts like the glass in the window; it permits some things to pass, light, while
blocking others, air. The heart of a firewall is the security policy that it enforces.
Security policies are a series of rules that define what traffic is permissible and what
traffic is to be blocked or denied. These are not universal rules, and there are many different sets
of rules for a single company with multiple connections. A web server connected to the internet
may be configured only to allow traffic on port 80 for HTTP, and have all other ports blocked.
An e-mail server may have only necessary ports for e-mail open, with others blocked. A key to
security policies for firewalls is the same as has been seen for other security policies, the
principle of least access only allow the necessary access for a function, block or deny all
unneeded functionality. How an organization deploys firewalls are designed to block attack
before they get to a target machine. Common target are web servers, e-mail servers, DNS server,
FTP services, and database. Each of these has separate functionality, and each of these has
separate vulnerabilities. Once you have decided who should receive what type of traffic and what
types should be blocked, you can administer this through the firewall.
Firewalls enforce the established security policies. They can do this through a variety of
means, including:
Network Address Translation (NAT) basic packet filtering, stateful packet
filtering.
Access Control Lists and Application layer proxies.
One of the most basic security function provided by a firewall is network address translation or
NAT. this service allows you to mask significant amount of information inside the firewall
without truly knowing its address.
Kerberos:
Kerberos was conceived as a secure network authentication technology at Massachusetts
Institute of Technology (MIT), where it continues to evolve. Using encryption as a seal, Kerberos
credentials, or tickets, vouch for authenticated users. Because every node on the network
exclusively trusts the Kerberos server, users’ credentials are valid throughout the network. This
way, they theoretically have to log in only once. In addition, Kerberos can provide support for
real-time encryption of network communication. This is like keeping the doors in your city
locked, but giving authorized citizens a key to every door.
Kerberos is an attractive technology, but it’s not a network security solution. We were
disappointed to learn that Kerberos wasn’t going to solve our problem of network wide user
management. Kerberos doesn’t replace even aged technology such as sun Microsystems’
Network Service, since it doesn’t supply the necessary account information found in
Unix’s/etc/password file the ability to manage user right or control access to network
Purchase answer to see full
attachment