Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Strayer University Honeypots and Firewalls Discussion

Strayer University Honeypots and Firewalls Discussion

Description

Both a firewall and a honeypot can function as an IDS. While the firewall’s main purpose is typically to establish a barrier between two networks to control traffic, the honeypot is a unique type of IDS providing other functionality. One of your clients has asked you if they need to install both, or will one of them alone provide adequate protection for their network?

Briefly analyze and discuss the benefits and drawbacks of each of the possible configurations (for example, firewall only, honeypot only, both firewall and honeypot) and answer your client’s question on the need for both.

Answer a classmate

Hello Professor and Classmates,

A firewall is a device installed between your internal network and the rest of the network. It will filter and forward. Firewalls monitor the flow of traffic between networks and the outside world. They have advantages and disadvantages but should always be used. A firewall is as only good as its configuration.

Advantages

It can block email and combat SPAM.

It can restrict access from both the outside and inside the organization.

It can act as a router of your data between networks.

It can Audit and log all traffic.

Disadvantages

It can’t protect data through social engineering

It can’t protect against what is allowed or permitted.

It can’t stop attacks from traffic that does not go through them.

It can’t stop or secure tunneling attempts.

It can be configured so strict you lose operational functionality. (People often don’t consider the firewall itself your own enemy)

A Honeypot is a network-attached decoy that lures attackers with data that is irrelevant (it should be!!!) to protect your assets and network and buy you time. Often a honeypot created is a server, application or a database that is loaded with lots of nothing. Large companies and most governments at all levels deploy these to harden their networks.Using a honeypot does work as an IDS because when you realize your data on “how to build a snowman in the desert” is discovered, copied and stolen you will know there is someone lurking in your network. These can be put outside the firewall of your network. Viewing the audit trails of your honeypot is your IDS. Our infrastructure uses VMs as honeypots since they are easy and cheaper to deploy. My favorite is the Malware Honeypot, its like a sweet taste of their own medicine dosed back.

Advantages

Less false positives

Cheaper than a network or lots of host based IDS implementation

Captures malice

Disadvantages

Only works when there is an attempt to collect data

Experienced and pro hackers can often recognize when they stumble upon one

It is still a risk, low but still a risk with access

I would suggest implementing both to have protection. I would instruct my client to have inside and outside protection. We should place a Honeypot on the outside and a firewall on the inside. The more armor you have the better.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: School Class Pro only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by School Class Pro are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. School Class Pro is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At School Class Pro, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.