Principles of Information Security
Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
Question
Book Icon
Chapter 6, Problem 14RQ
Program Plan Intro

Firewall architecture:

Entire firewall devices are configured in various network architectures. They might be mutually exclusive, but sometimes may not be. It works best for an organization that depends on following factors:

  • Main purposes of the network
  • Company’s capacity to establish the architectures
  • Cost of the utilities.

The common architectural implements of firewall are:

  • Single bastion hosts
  • Screened host architecture
  • Screened subnet architecture

Blurred answer
Students have asked these similar questions
How do screened host architectures for firewalls differ from screened subnet firewall architectures? Which of these offers more security for the information assets that remain on the trusted network? Why?
What is the difference between screened host architectures for firewalls and screened subnet architectures for firewalls? As a result, which of these provides more protection for information assets that stay on the trusted network? Why?
What are the key responsibilities of a network firewall in the context of the OSI model? In which layer(s) does it operate?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,