Week 7 chapter 5
docx
keyboard_arrow_up
School
Webster University *
*We aren’t endorsed by this school
Course
5600
Subject
Information Systems
Date
Jun 21, 2024
Type
docx
Pages
4
Uploaded by MagistrateRose25373
Week 7 Chapter 5 Assignment
Title: Enhancing Network Security: Exploring Screened-Subnet Firewall
Presented by: Saiteja Pathipaka
Date: 05/02/2024
1. Firewall Architecture Type:
A screened-host firewall is the layout that was selected for the firewall. A bastion host is located in the back of a screening router on a screened subnet on this configuration. Serving as a secure access point between the inner community and the outdoor international is the bastion host. The bastion host acts as a proxy server for external resources and is the handiest host with whom other servers on the network might also talk (Ivanova & Jurczyk, 2003).
2. Security and Protection:
The screened-host firewall employs more than one approach to ensure safety and safety.
Centralized Control: The bastion host enables centralized manipulation and tracking of network
traffic by performing as a choke factor for all site visitors entering and exiting the network.
Traffic Filtering: Using pre-established regulations and settings, the bastion host is set up to both allow or reject traffic. This makes it viable to have unique manipulation over the forms of site visitors which can be allowed, which improves security by decreasing possible factors of assault.
3. Monitoring and Logging: All network activity can be recorded with the aid of the bastion host, giving upward thrust to an audit trail of all traffic that passes via it. It is possible to discover and respond to viable security risks in real time with the aid of keeping an eye fixed on uncommon activity (Awati, 2022).
3. Potential Compromises:
If an assault on the bastion host is successful, the firewall is probably breached. An attacker gains sizeable leverage over the bastion host considering it's miles the only host allowed to speak directly with the outside global. An attacker may be capable of using the bastion host as a way of gaining an illegal right of entry to the inner community if they control the right of
entry.
4. Security Measures:
Many protection techniques can be put in an area to lessen the probability that the firewall will be compromised (Awati, 2022): Frequent Patching and Updates: To reduce recognized vulnerabilities, make certain the bastion host is saved on top of things with the most recent security updates. Minimize Allowed Traffic: To reduce the assault surface, configure the bastion host to permit only the naked minimum of traffic needed for business operations.
Monitoring and Reaction: To pick out and address questionable sports at the bastion host, put
in vicinity dependable monitoring structures. Any sudden behavior ought to be looked at properly away to come across and decrease security incidents earlier than they get worse.
5. Network Map Diagram:
The screening router within the above diagram serves as a partition between the internal community and the outside network. Before any traffic can access the inner community or the
outdoor world, it must first tour via the bastion host. In addition to acting as a firewall and proxy server, the bastion host manages and keeps an eye fixed on all traffic wafts (O’Reilly &
Associates, Inc., n.D.).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Reference:
Ivanova, J., & Jurczyk, M. (2003). Computer networks. In Elsevier eBooks
(pp. 561–576).
https://doi.org/10.1016/b0-12-227410-5/00133-2/
Awati, R. (2022, March 11). screened subnet. Security.
https://www.techtarget.com/searchsecurity/definition/screened-subnet/
O’Reilly & Associates, Inc. (n.d.). Screened Subnet Architectures
(Building Internet
Firewalls,2nd Edition https://docstore.mik.ua/orelly/networking_2ndEd/fire/ch06_03.html/