Categories: Uncategorized

Research Paper

W​‌‍‍‍‌‍‍‌‌‍‌‍‍‌‌‌‍‍‍‍​eek 7: Paper due Requirements: Prepare a report on your approved topic from Week 2 with a minimum of 2000 words, no less, but more is acceptable. References (10 minimum). any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted). The paper must have a title page, reference list and be in APA format. The information within your title page and reference list will not count towards the minimum word count. The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed). Correct spelling and grammar. APA formatting: Title page, in paragraph citations, and the Reference list. At a minimum include the following: · Detailed description of the area researched · Technology involved · Future trends · Global implications Outline and sources: Firewalls: Great Network Security Devices, but Not a “Silver Bullet” Solution Introduction A firewall is a great network security device that monitors and filters an organization’s network traffic (Voronkov et al., 2017). It is a security feature that is a barrier between public and private networks (Nife and Kotulski, 2020). Thesis: Although firewalls have a significant network security component, they do not act as an end to the network security feature. Therefore, firewalls must be supplemented by other security features to prevent cyber threats. Body Paragraph 1 Topic Sentence: To enhance network security, a firewall can be combined with additional network security components like VPN to minimize attacks such as Denial of Service (DoS). Detail: A combination of firewalls and VPNs provide master nodes between the small and intermediate nodes (Jingyao et al., 2019). The combination helps in hiding the IP address and blocking malicious data packages. • Detail 2: The security between the nodes ensures data is transmitted safely from the virtual encryption channel to the​‌‍‍‍‌‍‍‌‌‍‌‍‍‌‌‌‍‍‍‍​ devices containing VPN arrays and receivers. • Detail 3: According to Jingyao et al. (2019), a combination of VPN and firewalls adopts a network management system where one device can play the primary role of security protection while another acts as a backup. ? Body Paragraph 2 Topic Sentence: To enhance network security, a firewall can be supplemented with a multi-stage filter and secure web gateway to filter malicious URLs, codes, and fake IP sources. • Detail: According to Wu et al. (2018), a multi-stage filter comprises a packet filtering technology that helps protect firewalls. • Detail 2: A web gateway applies the internet access strategy while ensuring cyber threat protection (Iskandar et al., 2019). Conclusion ?Currently, a firewall is a technology that controls interconnection between various networks. Although it can protect systems and internal networks from threats, intranet, and internet face potential hazards that keeps growing. Therefore, firewalls should be supplemented with other security features to minimize cyber threats. References Iskandar, A., Virma, E., & Ahmar, A. S. (2019). Implementing DMZ in improving network security of web testing in STMIK AKBA. arXiv preprint arXiv:1901.04081. Jingyao, S., Chandel, S., Yunnan, Y., Jingji, Z., & Zhipeng, Z. (2019). Securing a network: how effective using firewalls and VPNs? In Future of Information and Communication Conference (pp. 1050-1068). Springer, Cham. Nife, F. N., & Kotulski, Z. (2020). Application-aware firewall mechanism for software-defined networks. Journal of Network and Systems Management, 28(3), 605-626. Voronkov, A., Iwaya, L. H., Martucci, L. A., & Lindskog, S. (2017). Systematic literature review on the usability of firewall configuration. ACM Computing Surveys (CSUR), 50(6), 1-35. Wu, P., Huang, S. Y., Zhou, W., Yu, W., Liu, Z., Chen, X., & Liu, C. (2018). Compact high-efficiency broadband rectifier with multi-stage-transmission-line matching. IEEE Transactions on Circuits and Systems II: Express Briefs, 66(8​‌‍‍‍‌‍‍‌‌‍‌‍‍‌‌‌‍‍‍‍​), 1316-1320.

admin

Share
Published by
admin

Recent Posts

Childbirth

For this short paper activity, you will learn about the three delays model, which explains…

6 months ago

Literature

 This is a short essay that compares a common theme or motif in two works…

6 months ago

Hospital Adult Medical Surgical Collaboration Area

Topic : Hospital adult medical surgical collaboration area a. Current Menu Analysis (5 points/5%) Analyze…

6 months ago

Predictive and Qualitative Analysis Report

As a sales manager, you will use statistical methods to support actionable business decisions for Pastas R Us,…

6 months ago

Business Intelligence

Read the business intelligence articles: Getting to Know the World of Business Intelligence Business intelligence…

6 months ago

Alcohol Abuse

The behaviors of a population can put it at risk for specific health conditions. Studies…

6 months ago