Firewalls protect against cyberattacks and other malicious traffic by scanning each data packet that tries to enter the network. A perimeter firewall can also act as a proxy service, an intermediary between users and the internet, that allows greater access control by an administrator. Network firewalls can be software or hardware technologies that provide a first line of defense to a network. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by the organization. A hardware firewall, or perimeter firewall, is installed between an organization’s network and the Internet to protect the systems inside, a hardware firewall protects environments from the outside world. A software firewall only protects the device it is installed on, a software firewall protects a specific device from internal threats. Firewall components:  Internet Protocol (IP) packet filtering. Network address translation (NAT) services. SOCKS server. Proxy servers for a variety of services such as HTTP, Telnet, FTP, and so forth. Mail relay services. Split Domain Name System (DNS)Logging. Real-time monitoring.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Requirement: reply to this discussion, kindly and respectfully

 

I)  Firewalls protect against cyberattacks and other malicious traffic by scanning each data packet that tries to enter the network. A perimeter firewall can also act as a proxy service, an intermediary between users and the internet, that allows greater access control by an administrator. Network firewalls can be software or hardware technologies that provide a first line of defense to a network. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by the organization. A hardware firewall, or perimeter firewall, is installed between an organization’s network and the Internet to protect the systems inside, a hardware firewall protects environments from the outside world. A software firewall only protects the device it is installed on, a software firewall protects a specific device from internal threats.

Firewall components:  Internet Protocol (IP) packet filtering. Network address translation (NAT) services. SOCKS server. Proxy servers for a variety of services such as HTTP, Telnet, FTP, and so forth. Mail relay services. Split Domain Name System (DNS)Logging. Real-time monitoring.

Firewalls are a central element which no security concept can do without. Implementing important concepts from and proven procedures (best practices), such as defense in depth and zones and conduits, firewalls are essential to operations. Technical development in recent years has shown that firewalls not only vary greatly in their technical characteristics, but also in the features and equipment of their hardware, the approvals, as well as their operation and, therefore, their ability to be used in the industrial environment.

It is crucial to choose the correct firewall for various tasks in the industrial network due to these complex security concepts with diverse technologies.

 

II)  Common Criteria is a framework in which computer system users can specify their security functional requirements (SFRs) and security functional assurance requirements (SARs) using Protection Profiles (PPs). Common Criteria provides assurance that the process of specification, implementation and evaluation of a computer security product has been conducted in a rigorous, standard and repeatable manner at a level that corresponds with its target use environment.

There are several purposes as to why the Common Criteria certification exists. Some of these include:

A) To improve the availability of security-enhanced IT products and protection profiles that have been successfully evaluated by the panel.

B) To ensure that evaluations of IT products and protection profiles are performed to consistently high standards and contribute to confidence in those profiles and products.

C) To remove the burden of duplicate IT product evaluations and protection profiles.

D) To improve the cost-effectiveness and efficiency of the validation/certification process for protection profiles and IT products.

 

III)  Most program managers assess the value and impact of their work all the time. Evaluation Assurance Level (EAL) is a category ranking assigned to an IT product or system after a Common Criteria security evaluation. The level indicates to what extent the product or system was tested. The increasing assurance levels reflect added assurance requirements that must be met to achieve Common Criteria certification. The intent of the higher levels is to provide higher confidence that the system's principal security features are reliably implemented.

To achieve an EAL, the computer system must meet specific assurance requirements. The higher EALs involve more detailed documentation, analysis, and testing than the lower ones. The EAL number assigned to a certified system indicates that the system completed all requirements for that level.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Networking
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education