Bailey Johnson

ITS 370


1.       Using the Web, search for “software firewalls.” Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.


 I choose four of the firewall software are: Comodo Internet Security Pro, Agnitum Outpost Pro Firewall, Kaspersky Internet Security and Zone Alarm Pro Firewall. I will compare all of the functionality, cost, features, and type of protection and weighted ranking. The principal all of the “software firewalls.” is primary method for keeping a computer secure from intruders and allows or blocks traffic into and out of a private network or the user's computer. The Firewalls software are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network. The firewall are also used to keep internal network segments secure and protection against viruses and malware by focusing on prevention not simply detection. The patent pending prevention-based technology creates an impenetrable shield that identifies safe, unsafe and questionable files. The firewall Internet Security Complete offers real-time protection against Viruses, Trojans, Adware, Spyware and other Malware threats. Other Antivirus products depend on signature updates alone but Auto Sandbox Technology means you’re protected from even unknown threats. The help and support Internet Security Complete from these company are more than a security suite, it also offers24/7 access to our highly trained PC experts ready to provide support anytime day or night.


Software             Cost                      Functionality   Features       Protection

Comodo             $39.99 / ****      *****                *****          *****

BitDefender      $39.99 / ****       *****               **                 *****

Agnitum            $39.99 /  ****      *****               **                  *****

Norton              $69.99 /  *             *                        **                  *

McAfee             $39.99 / ****       **                      **                  **

Zone Alarm      $29.99 / *****     ****                 ***                 *


2.       Using Figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.


TIMBUKTU External port: 407 Internal port: 407 Protocol: TCP/UDP

Any ports for Timbuktu Pro Windows listed on this page should be opened of forwarded in your router/firewall to allow proper connection to an online server or dedicated sever and/or when you want to host an online multiplayer game or application from your computer or local area network.


3.       Suppose management wants to create a “server farm” for the configuration in Figure 6-18 that allows a proxy firewall in the DMZ to access an internal Web server (rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What are the advantages and disadvantages to this implementation?


As far as technical difficulties, it would be exposed to higher level risks from a less trusted network. The advantage would be gaining extended access to an internal Web server. But the disadvantage would be you would have to accept the risk of getting exposed to un-trusted users.


4.       Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.


The two applications I found that were highly recommended are NTRConnect and TeamViewer. NTRConnect uses a 256 bit encryption to secure a connection and gives you remote-access to your files at home using any PC, Mac, iPhone or Windows Mobile device. TeamViewer uses and AES 256 bit encryption that gives you access to your files from iPhone, Linux, Mac and Windows.


5.       Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering and b) protection from unwanted items like cookies?


You can configure Internet Explorer to control the kinds of content users can view in the browser. There are two ways to do this. You can use content rating systems or you can specify Web sites. Administration of content-rating systems is done by independent organizations. Internet Explorer defaults to the rating from the Internet Content Ratings association.

To Enable the Content Advisor Feature: In Internet Explorer click Internet Options on the Tools menu. Click the content Tab. Under Content Advisor, click Enable.

Or you can configure your privacy setting in Internet Explorer by clicking Internet Options on the Tools menu and then clicking the Privacy tab.