Essay

User Generated

3oqbb

Writing

Description

I did like %99 percent of the Homework!, so i just need you to look over it complete anything that I missed and  add APA citations. 

Please Please & Please Read the attached Requirements, and make sure I did a good Job on what i did and add anything that i missed. 


THANKS :)

Assignment 325.docx 

assignment 3255.odt 

Unformatted Attachment Preview

Working individually describe the compression/archive utilities listed below: • Kerberos • Firewalls For Kerberos, discuss the following topics: • What it is • Describe the protocol • Requests and authentications • Technologies that rely on it For firewalls, discuss the following topics: • What they are • Describe how each generation works • List and describe different open-source and shareware firewalls • Compare and contrast the different products you have found • Pick one product and describe the installation process on Linux Ubuntu The paper should be formatted using 1inch margins, 1.5 spaces between lines, Times New Roman font size 12 for the text and size 16 for titles. The title page and list of references will not count towards the total number of pages. The last page should be at least 50% complete. Turn in the report in .doc or .docx format. Cite any references you will use to create the paper. Not citing sources will result in plagiarism. Also copying and pasting directly from the sources without properly citing will result in plagiarism. The result of plagiarism is a grade of 0 for the assignment and may lead to consequences described in the syllabus. You should use APA-style citation and reference formatting for this paper. You can find references on how to use the APA style at the following address: http://cooklibrary.towson.edu/styleGuides.cfm#APA 5 Firewall: A firewall is a network device, hardware, software, or a combination of the two, whose purpose is to enforce a security policy across its connections. It is comparable to a wall that has a window where the wall serves keep things out, except those permitted through the window. A security policy acts like the glass in the window; it permits some things to pass, light, while blocking others, air. The heart of a firewall is the security policy that it enforces. Security policies are a series of rules that define what traffic is permissible and what traffic is to be blocked or denied. These are not universal rules, and there are many different sets of rules for a single company with multiple connections. A web server connected to the internet may be configured only to allow traffic on port 80 for HTTP, and have all other ports blocked. An e-mail server may have only necessary ports for e-mail open, with others blocked. A key to security policies for firewalls is the same as has been seen for other security policies, the principle of least access only allow the necessary access for a function, block or deny all unneeded functionality. How an organization deploys firewalls are designed to block attack before they get to a target machine. Common target are web servers, e-mail servers, DNS server, FTP services, and database. Each of these has separate functionality, and each of these has separate vulnerabilities. Once you have decided who should receive what type of traffic and what types should be blocked, you can administer this through the firewall. Firewalls enforce the established security policies. They can do this through a variety of means, including:  Network Address Translation (NAT) basic packet filtering, stateful packet filtering.  Access Control Lists and Application layer proxies. One of the most basic security function provided by a firewall is network address translation or NAT. this service allows you to mask significant amount of information inside the firewall without truly knowing its address. Kerberos: Kerberos was conceived as a secure network authentication technology at Massachusetts Institute of Technology (MIT), where it continues to evolve. Using encryption as a seal, Kerberos credentials, or tickets, vouch for authenticated users. Because every node on the network exclusively trusts the Kerberos server, users’ credentials are valid throughout the network. This way, they theoretically have to log in only once. In addition, Kerberos can provide support for real-time encryption of network communication. This is like keeping the doors in your city locked, but giving authorized citizens a key to every door. Kerberos is an attractive technology, but it’s not a network security solution. We were disappointed to learn that Kerberos wasn’t going to solve our problem of network wide user management. Kerberos doesn’t replace even aged technology such as sun Microsystems’ Network Service, since it doesn’t supply the necessary account information found in Unix’s/etc/password file the ability to manage user right or control access to network
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags