NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) http://download.cnet.com/ZoneAlarm-Free- Firewall/3000-10435_4-10039884.html www.firewallguide.com/freeware.htm EXERCISE 4.1: The McAfee...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) http://download.cnet.com/ZoneAlarm-Free- Firewall/3000-10435_4-10039884.html www.firewallguide.com/freeware.htm EXERCISE 4.1: The McAfee Firewall 1. Download the McAfee personal firewall. You may wish to download one copy to one machine for the entire class to take turns using, or contact McAfee and request an academic discount or free copy. 2. Install and configure the McAfee firewall on your machine. 3. Examine the firewall's configuration utilities. 4. Examine extra features such as its attack tracing utility. 5. Attempt to send packets to blocked ports on that firewall. EXERCISE 4.2: Router-Based Firewall Note: For cost reasons a specific router is not mentioned here. Many companies and vendors will donate old routers they no longer use to academic labs. You can go to a used computer equipment outlet and find an older router-based firewall for use in the lab. 1. Using the firewall's documentation, set up this firewall. It should be connected to at least one machine. 2. Attempt to send packets to blocked ports on that firewall. EXERCISE 4.3: ZoneAlarm Firewall This oduct was not covered in this chapter, but you can work with it quite easily. Simply follow these steps: ( NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) 1. Download the free version from https:// www.zonealarm.com/software/release-history/ zafree.html. 2. Install and configure this firewall. 3. Observe how it works and compare it to other firewalls you have looked at in previous exercises. PROJECTS PROJECT 4.1: Finding Firewall Solutions in Your Organization Contact an organization you are associated with (an employer, your school, a local company, etc.). Explain to the organization that you are doing a school project and arrange to discuss its firewall solution with the network administrator. Determine why the organization selected its particular solution. Was cost a major factor? Was ease of use a major factor? What features were most important to them? Explain your findings and discuss whether you agree or disagree with that organization's choice. PROJECT 4.2: Finding a Different SOHO Solution Using the web or other resources, find a SOHO firewall not mentioned in this chapter. Briefly compare and contrast it to the solutions that were mentioned in the chapter. Evaluate whether the firewall you found is a better choice than the ones mentioned in the chapter and discuss why or why not. PROJECT 4.3: Selecting the Proper Firewall NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) Analyze the environment of your academic institution. Is it a medium-sized network or enterprise? What types of users utilize the network? Are there multiple operating systems? Is there sensitive data that requires additional security? Based on the factors you analyze, write a brief essay describing the environment and recommending a firewall solution. Explain your recommendation. NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) http://download.cnet.com/ZoneAlarm-Free- Firewall/3000-10435_4-10039884.html www.firewallguide.com/freeware.htm EXERCISE 4.1: The McAfee Firewall 1. Download the McAfee personal firewall. You may wish to download one copy to one machine for the entire class to take turns using, or contact McAfee and request an academic discount or free copy. 2. Install and configure the McAfee firewall on your machine. 3. Examine the firewall's configuration utilities. 4. Examine extra features such as its attack tracing utility. 5. Attempt to send packets to blocked ports on that firewall. EXERCISE 4.2: Router-Based Firewall Note: For cost reasons a specific router is not mentioned here. Many companies and vendors will donate old routers they no longer use to academic labs. You can go to a used computer equipment outlet and find an older router-based firewall for use in the lab. 1. Using the firewall's documentation, set up this firewall. It should be connected to at least one machine. 2. Attempt to send packets to blocked ports on that firewall. EXERCISE 4.3: ZoneAlarm Firewall This oduct was not covered in this chapter, but you can work with it quite easily. Simply follow these steps: ( NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) 1. Download the free version from https:// www.zonealarm.com/software/release-history/ zafree.html. 2. Install and configure this firewall. 3. Observe how it works and compare it to other firewalls you have looked at in previous exercises. PROJECTS PROJECT 4.1: Finding Firewall Solutions in Your Organization Contact an organization you are associated with (an employer, your school, a local company, etc.). Explain to the organization that you are doing a school project and arrange to discuss its firewall solution with the network administrator. Determine why the organization selected its particular solution. Was cost a major factor? Was ease of use a major factor? What features were most important to them? Explain your findings and discuss whether you agree or disagree with that organization's choice. PROJECT 4.2: Finding a Different SOHO Solution Using the web or other resources, find a SOHO firewall not mentioned in this chapter. Briefly compare and contrast it to the solutions that were mentioned in the chapter. Evaluate whether the firewall you found is a better choice than the ones mentioned in the chapter and discuss why or why not. PROJECT 4.3: Selecting the Proper Firewall NETWORK DEFENSE AND COUNTERMEASURES (PEARSON IT CYBERSECURITY CURRICULUM (ITCC)) Analyze the environment of your academic institution. Is it a medium-sized network or enterprise? What types of users utilize the network? Are there multiple operating systems? Is there sensitive data that requires additional security? Based on the factors you analyze, write a brief essay describing the environment and recommending a firewall solution. Explain your recommendation.
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
CANMNMM January of this year. (a) Each item will be held in a record. Describe all the data structures that must refer to these records to implement the required functionality. Describe all the...
-
You are required to write a Python program that will manage character (heroes and villain) information. Character (hero and villain) information will be stored in a text file that will be read in...
-
In Exercises 1318, find the average rate of change of the function from x 1 to x 2 . f(x) = 3x from x 0 to x = 5
-
The Peppy Paladin Caf is an experiential learning lab at a state university in the Midwest. After the food service operator closed a dining location in the business building, students developed the...
-
Balance the following oxidationreduction equations.
-
Describe some of the fields or disciplines that are expected to be influenced by the development of workable and widely available quantum computers.
-
Nick Cola Corporation produces a new soft drink brand, Sweet Spring, using two production departments: mixing and bottling. Nicks beginning balances and data pertinent to the mixing departments...
-
Consider a photon with wavelength 2.00 pm which scatters from a particle at rest with unknown mass. A detector measures the wavelength of the scattered photon to be 3.00 pm when the scattering angle...
-
Target Corporation reported the following on its income statement. For 12 Months Ended ($ millions) Feb. 2, 2019 Feb. 3, 2018 Jan. 28, 2017 Total revenue $75,356 $72,714 $70,271 Cost of sales 53,299...
-
Introduction Tim booked an appointment to see you two weeks ago. As a result of a life changing event, Tim has requested a limited scope statement of advice concerning his estate plan. Facts as...
-
Although the name Rolls-Royce is inextricably linked with its ultra-luxurious automobiles, the modern Rolls-Royce operates in an entirely different competitive environment. A leading manufacturer of...
-
Go to the PMI Web site and examine the link Membership. What do you discover when you begin navigating among the various chapters and cooperative organizations associated with the PMI? How does this...
-
Describe the features of a project. How do they differ from day-to-day processes within an organization?
-
In 2003, the Department of Health and Human Services in Victoria, Australia, initiated a AU$323 million project to develop HealthSMART, an integrated IT system that would deliver resource management,...
-
Consider the case on the BBCs Digital Initiative Media in this chapter. What do you think were the main problems associated with the BBCs approach to project management? What challenges did the...
-
Use each graph to estimate the half-life of polonium-211 two half-lives from the two graphs might differ slightly. If so, discuss what is different between these two graphs. Also, discuss what...
-
F.(3e* -2x 3 sin(2x)) is equal to 2 3 Cos 8. IT 3, t (4+@ 2 3, 1+o 1 4 Cos 4 4 1 3. 1 +4cos V7 (1+o 4 1 4 Cos 4 1+0 4-
-
The 2020 coronavirus crisis has been devastating. However, not all industries and not all firms have suffered. Some may have profited from these events. Why have some industries and some firms...
-
Assuming you work for a New Zealand company exporting a container of kiwi fruit to Haiti. The customs official informs you that there is a delay in clearing your container and it may last a month....
-
On June 27, 2017, a malware infectionNotPetyabegan spreading from Ukraine. It affected firms in many countries, although the greatest impact was in Ukraine. As a result of this malware infection,...
-
A container of an organic liquid a $25^{\circ} \mathrm{C}$ has a mass of $1100 \mathrm{~kg}$ and a volume of $0.94 \mathrm{~m}^{3}$. Find the liquid's weight, its density, and its specific gravity.
-
A vertical, cylindrical tank with a diameter of $10 \mathrm{~m}$ and a depth of $4 \mathrm{~m}$ is filled to the top with water at $25^{\circ} \mathrm{C}$. If the water is heated to $60^{\circ}...
-
The system in Figure P1.6 is at $20^{\circ} \mathrm{C}$. If atmospheric pressure is $101.3 \mathrm{kPa}$ and the absolute pressure at the bottom of the tank is $264.1 \mathrm{kPa}$, what is the...
Study smarter with the SolutionInn App