Adrian Leal

Shin-Ping Tucker

ITS 370

ISCH6

 

1.       Using the Web, search for “software firewalls.” Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

Some of the software firewall that I found include:

ZoneAlarm: Tough firewall resists direct attack. Flexible, comprehensive spam filter offers unusual features. Powerful, flexible parental control. Marks dangerous links, Includes credit reporting, 5GB online backup, Do Not Track Me button. Parental control system lacks remote management, caused system slowdown. Firewall doesn't block exploit attacks. Antiphishing not effective. The price is $39.95. https://www.pcmag.com/article2/0,2817,2417413,00.asp

TrendMicro: Protects five devices, all platforms. Excellent scores in our antiphishing and malicious URL blocking tests. Multi-faceted ransomware protection. Password manager. Many bonus features. Some poor scores from independent labs. Parental control limited. Fewer features on macOS, fewer still on iOS. No firewall. The price is $59.95 https://www.pcmag.com/article2/0,2817,2469751,00.asp

Norton: Top malware removal score in PCMag's test; high ratings from independent labs. Intelligent firewall. Excellent exploit blocking. Accurate antispam and antiphishing. Scam insight flags potentially dangerous websites. Updated behavioral detection. Links with other Norton products/services. Good-not-great score in PCMag's malware blocking test. Minor effect on system performance. The price is $79.99 https://www.pcmag.com/article2/0,2817,2409925,00.asp

 

2.       Using Figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.

Timbuktu uses UDP 407 and 1419 for Connection setup and handshaking, TCP 1417 for Send Commands, TCP 1418 for View Screen, TCP 1419 for Send file, and TCP 1420 for Receive file. The ports to allow a remote user to access an internal machine form the Internet using this software are ports 1417/TCP and 1420/TCP.

3.       Suppose management wants to create a “server farm” for the configuration in Figure 6-18 that allows a proxy firewall in the DMZ to access an internal Web server (rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What are the advantages and disadvantages to this implementation?

It is a good solution to place a Web server that contains critical data inside the network. For technical difficulties, it would be exposed to higher level risks from a less untrusted networks. The advantage, it allows extended access to an internal Web servers. The disadvantage, it would have to accept the risk of getting exposed to un-trusted users.

4.       Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.

There are several options to access remotely to a PC, some of them are:

GoTomyPc: It automatically configures itself to your computer and you can access your computer from anywhere in the world with a computer running on Windows, Linux or even Macintosh.

Radmin: It has high-level security using 2048-bit key size. Your data is securely transferred between the computers giving hackers no chance. It works at high speeds, it automatically adjusts with change in the internet speeds. It supports text and voice chat so you can stay in touch with the people on your network.

TeamViewer: This application allows you to control any computer through web – all you have to do is run the application on both the systems. You can use this application togive business presentations to your partners or customers. By drag and drop, you can easily transfer files between computers.

 

5.       Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

These two tabs offer the possibility to configure some aspects of your connection and the information that different sites can get from you. The security tab, offer different levels of security that can be changed (the assigned is medium), for example restrictions for the content downloaded. The privacy tab, has a similar bar that allows the user to determine the security level that wants to configure for the system. The medium security level blocks third-party cookies, blocks third-party cookies to download your information, and add blocker for pop-ups.