Tanner Carlson

ITS 370

CH6

10/20/2017

1.     Using the Web, search for “software firewalls.” Examine the various alternatives available and compare their functionality, cost, features, and type or protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

After doing some research on the Internet, I found a variety of software firewalls. Out of all the firewalls available, I think the best one would be BitDefender. The best part about BitDefender is that is has multiple layers of security, and has a primary focus on social network sites like Facebook and Twitter. Another positive for BitDefender is that it is relatively cheap, only costing $50 for a home package. I will rank the other software firewalls I found below.

            Rank #1 – BitDefender

            Rank #2 – Norton (Works on multiple devices, reliable, relatively cheap)

Rank #3 – BullGuard (multiple devices, a bit more expensive, high attention to social networks.

2.     Using figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.

Application: TIMBUKTU

External port: 407

Internal Port: 407

Protocol: TCP/UDP

Both the external and internal port should be opened or forwarded in the router/firewall (depending on how the system was built) to allow a proper connection to an online server from an outside source. If only one of these ports is open, the user may not be able to connect properly. If both of these ports are closed, the user will not be able to connect at all.

3.     Suppose management wants to create a “server farm” for the configuration in Figure 6-18 that allows a proxy firewall in the DMZ to access an internal Web server (rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What are the advantages and disadvantages to this implementation?

The main technical difficulty associated with allowing a proxy firewall in the DMZ to access an internal Web server, would be that the internal Webserver would need both proxy access and controlled access. The advantages to this implementation is companywide access and usage of the new internal web server. The disadvantage to this implementation is it creates a high security risk.

4.     Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.

There are several ways to enable secure remote access to a PC. If one were highly skilled they could enable secure remote access to a PC without an application, but many do not have this kind of skill or the time required to learn or implement this skill. Luckily man applications are available to enable secure remote access to a PC. One of the better applications to accomplish such a feat is GoToMyPC. A few other well known applications to enable secure remote access to a PC are LogMeIn, TeamViewer, PCnow and Radmin.

5.     Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

On a Microsoft Windows system, Internet Explorer can provide the user with some content filtering. Using the Security and Privacy tabs under the Internet Options menu, users can disable or enable XAML browser applications, XPS documents, and ActiveX controls and plug-ins. Internet Explorer can also protect the user from unwanted items like cookies. Using the same menus, users can tell Internet Explorer to accept, block, or prompt the user for both first-part and third-party cookies.