Shaye Trenda

ITS 370

Chapter 6 Exercises

1.      Using the Web, search for “software firewalls.” Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

Visit: http://www.toptenreviews.com/software/privacy/best-personal-firewall-software/

I think the best software firewall programs depend on the type of computer you have and also how much you use the Internet. The link above lists the top 10 software firewalls. I personally would pick Avira because it is free and is top-rated and still receives high scores for protection.

2.     Using figure 6-18, create one or more rules necessary for both the internal and external firewalls to allow a remote user to access an internal machine from the Internet using the Timbuktu software. Your answer requires researching the ports used by this software packet.

One rule that should be necessary for both internal and external firewalls to allow a remote user access in an internal machine from the Internet would be: Any ports for Timbuktu Pro Windows should be opened or forwarded in your router/firewall to allow proper connection to an online server or dedicated server and/or when you want to host an online multiplayer game or application from your computer or local area network.

3.     Suppose management wants to create a “server farm” for the configuration in Figure 6-18 that allows a proxy firewall in the DMZ to access an internal Web server (rather than a Web server in the DMZ). Do you foresee any technical difficulties in deploying this architecture? What are the advantages and disadvantages to this implementation?

I think that this a good solution because it protects Web severs from compromise and places proxies in the DMZ to carry requests. This also allows HTTP traffic to reach the Web server and prevents non-HTTP traffic from reaching the Web server. Some disadvantages would be the Web response time and an increase of traffic through the internal firewall.

4.     Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.

Using the Internet, the following applications are commercially available to enable secure remote access to a PC: (Not listed in any particular order)

1.     GoToMyPC

2.    LogMeIn

3.    TeamViewer

4.    PCnow

5.    Radmin

6.    Anyplace Control

-I’ve only head of GoToMyPC and LogMeIn before, the other applications are new to me.

More details on these applications can be found at: (http://www.quickonlinetips.com/archives/2009/08/pc-remote-access-software/)

5.     Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering and b) protection from unwanted items like cookies?

a)    You can configure Internet Explorer to control the kind of content users can view in the browser. You can control content by either using content rating systems or specifying Web sites.

b)    You can configure your privacy settings in Internet Explorer by clicking the Privacy setting and then by choosing: Block All Cookies, High, Medium High, Medium (which is the default), Low, and Accept All Cookies.

Source: http://support.Microsoft.com/kb/283185