CYB3401unit6 - class assignment PDF

Title CYB3401unit6 - class assignment
Course Cyber Security and Crime
Institution Columbia Southern University
Pages 9
File Size 161.9 KB
File Type PDF
Total Downloads 88
Total Views 141

Summary

class assignment...


Description

Running head: NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 1

Comparing Network Firewall and Cloud Computing Features CYB 4301 Unit 6 Assignment Columbia Southern University June 8, 2018

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 2 Comparing Network Firewall and Cloud Computing Features Case Project 6-4: Network Firewall Comparison Chart comparing the three network firewalls Type of

Setting-

Stateful or Stateless

Other features

Cost

Firewall

based or

Packet Filtering

s

Cisco ASA

Rule-based Setting-

Stateless-packet filtering VLAN support, URL

$500

5500-X Series

based

filtering, Application

Firewalls

control, and a remote access VPN

Algorithm-AES, Triple DES

IPS Throughput-Reaching

SonicWall-TZ

Setting-

105

based

Stateful-packet filtering

75 Mbps of Encryption RADIUS support, Intrusion Prevention System, attack preventionDDoS

Algorithm-Tripe DES, SHA-1, MD5, DES, and

$420

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 3 256 bit AES

IPS Throughput- up to 60 Mbps of encryption

Could be configured to

VoIP support, Intrusion

NextGen

become either stateful or

Detection System, DoS

Firewall-F10

stateless packet filtering

attack

Barracuda

Rule-based

$485

Algorithm-256 bit AES, 128 bit AES, Triple DES, DES

IPS Throughput-up to 60 Mbps of encryption

The recommended network firewall I am most likely recommending SonicWall-TZ 105 after a thorough review of the three types of firewalls. In my view, the protection against forged and unauthorized communications is very important compared to the speed since SonicWall-TZ 105 provides the most secure and advanced forms of encryption algorithms (Cnet, 2018). Besides, the recommended firewall comprises some in-built DDoS for attack prevention and has a RADIUS support. The settingbased product provides improved overall protection and is more intelligent even though the Barracuda NextGen Firewall-F10 could be configured in either way relative to packet filtering

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 4 (Wilkins, 2014). Additionally, Cisco ASA 5500-X Series Firewalls is likely to have the rapid IPS throughput of all of the product, however, the security features are limited which pose the challenge of probable intrusions and vulnerabilities (Lalji & Camden, 2018). Case Project 7-2: Comparing Cloud Computing Features A selection of one cloud over another will be narrowed to workloads that every customer is running in addition to their needs and wants. Ideally, it is always the situation that firms will utilize both providers located in various sections of their operations and for various application scenarios. Nonetheless, there are several determining factors that distinguish the choice of the firms which is likely to assist the end-users to determine the best for them. It is important to first examine services provided by both firms. Notably, both Azure and Amazon Web Services provides the same capabilities to a great extent in relation to networking, storage, and computing (Sabharwal & Wali, 2013). Azure and AWS have similar elements of the public cloud and includes identification of management features, compliance, plus security, auto-scaling, instant provisioning, and selfservice. The companies continue to invest in satisfying the needs of the new cloud services. The process has led to the further provision of mature analytics. For instance, the help for Hadoop clusters is offered in both Azure and Amazon Web Services as HD Insight and Elastic Map Reduce respectively. Microsoft and AWS have included some machine learning devices and other features aiming the Internet of Things (Lunden, 2015). The customers are able to develop an improved performance computing setting or tap cloud to diversely create a mobile app depending on their preferences.

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 5 In the meantime, the existing buzz associated with the containers is taken care of also where the two providers back the Docker services. The Microsoft firm has managed to develop its Hyper-V container technology predicted to operate on-premise data centres which will be a component of the promising Windows Server for 2016 release (Copeland, Soh, Puca, Manning & Gollob, 2015). A number of the default soft limits comprise the following. Technical Limitation Virtual Private Cloud High I/O Instance Elastic Load Balancer Elastic IP EBS Volume EC2 Instance

Default Limit 5 2 10 5 for every region An aggregate of 20 TiB or 5000 volumes 20 for every region

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 6 After using the EULA analyze tool for the Microsoft Windows EULA, I found only two instances that Reference to tracking or monitoring. They are number 161, this feature determines whether a system is connected to a network by either passive monitoring of network traffic or active DNS or HTTP queries. The next one was number 192, this one is Your use of the Media Center Features to connect to those services as your consent to collection and use of such information. I was not aware of these agreements, and no I do not agree with these conditions, but I have no real issues with them knowing what I search for regularly. I than used the EULA analyze tool to look up iTunes EULA, and I found nine instances that Reference to tracking or monitoring. They are number 22, Apple may monitor your use of the Services and Content to ensure that you are following these Usage Rules. Number 35, For the sake of clarity, each device used serially or collectively by multiple users requires a separate license. Number 46, If we cannot charge your payment method for any reason (such as expiration or insufficient funds) and you have not cancelled the Paid Subscription, you remain responsible for any uncollected amounts, and we will attempt to charge the payment method as you may update your payment method information. Number 55, Apple may monitor and decide to remove or edit any submitted material. Number 76, If you turn on these features, you will be asked to give apple permission to collect and store certain data, including but not limited to data about your device activity, location, and usage. Number 103, You may not copy (except as permitted by this license and the Usage Rules) reverse-engineer, disassemble, attempt to derive the source code of, modify, or create derivative works of the Licensed Application, any updates, or any part thereof (except as and only to the extent that any foregoing restriction is prohibited by applicable law or the extent as maybe permitted by the licensing terms governing use of any open-sourced components included with the Licensed Application). b. Consent to Use pf Data: You agree that

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 7 Licensor may collect and use technical data and related information including but not limited to technical information about your device, system and application software and peripherals that is gathered periodically to facilitate the provision of software updates, product support and other services to you (if any) related to the Licensed Application. Number 109, The Licensed Application may enable access to Licensor and/or third-party services and websites (collectively and individually, “External Services”). You agree to use the External Services at your sole risk. Number 152, iCloud Music Library collects information about your iCloud Music Library Content. Number 157, When you use iCloud Music Library, Apple logs information such as the tracks you play, stop or skip, the device you use and the time and duration of play back. No none of these features are similar tracking or monitoring to the Windows features. I agree with some of these but not all of them. I agree with 22, 35, 46, and 103 because they are collecting data and information about me to use or give to a third party partner.

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 8

References

Cnet. (2018). Dell SonicWALL TZ 105 - security appliance - SonicWALL Gen4 Firewall Replacement Series Specs. Retrieved from https://www.cnet.com/products/dell-sonicwalltz-105-security-appliance-sonicwall-gen4-firewall-replacement-series/specs/ Copeland, M., Soh, J., Puca, A., Manning, M., & Gollob, D. (2015). Microsoft Azure. Berkeley, CA: Apress. Lalji, F., & Camden, D. (2018). Cisco Advanced Malware Protection for Endpoints - subscription license (5 years) - 1 node. Retrieved from http://www.zones.com/site/product/index.html? id=102013028&page_name=product_tech_spec Lunden, I. (2015). Amazon Launches AWS IoT — A Platform For Building, Managing And Analyzing The Internet Of Things. Retrieved from https://techcrunch.com/2015/10/08/amazon-announces-aws-iot-a-platform-for-buildingmanaging-and-analyzing-the-internet-of-things/ Sabharwal, N., & Wali, P. (2013). Cloud Capacity Management. Dordrecht: Apress. Wilkins, S. (2014). Next Generation Firewall (NGFW) Comparison - A Guide to Choosing a Next-Generation Firewall. Retrieved from http://www.tomsitpro.com/articles/nextgeneration-firewall-vendors,2-847-2.html

NETWORK FIREWALL AND CLOUD COMPUTING FEATURES 9...


Similar Free PDFs