methodologies that Microsoft Windows firewall uses, Define a firewall. Define firewall security techniques,strengths and weaknesses of the Microsoft Windows firewall

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Write between 200 and 300 words.

4/21/2021 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&i… 1/

3

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

%100

SafeAssign Originality Report
Computer Security: Foundations – 202130 – CRN164 – Thatal • Week Ten Assignment

%100Total Score: High riskCharani Madala
Submission UUID: d598d98a-f107-6f61-e12b-2094ef1a2905

Total Number of Reports

1

Highest Match

100 %
MicrosoftFirewall x

Average Match

100 %
Submitted on

03/28/21
10:51 PM EDT

Average Word Count

359
Highest: MicrosoftFirewall x

%100Attachment 1

Institutional database (3)

Student paper Student paper

Student paper

Top sources (3)

Excluded sources (0)

View Originality Report – Old Design

Word Count: 359
MicrosoftFirewall x

2 3 1

2 Student paper 3 Student paper 1 Student paper

Microsoft Windows Firewall Security Techniques 1

Microsoft Windows Firewall Security Techniques 4

Microsoft Windows Firewall Security Techniques

Student Name: Institutional Affiliation: Course ID: Instructors Name: Submission Date:

A firewall is a networking device that filters network traffic (data packets) entering and leaving the network. They create a barrier between a trusted private net-

work and public networks such as the internet (Ciprian, 2019) methodologies Static packet filtering controls the access based on the user-defined rules. It does this by
monitoring source IP address, destination IP address, and port number. It operates on layers 3 of the OSI model (Ciprian, 2019). Advantages of static packet filtering ·
It’s easy to implement and configure · Has a negligible effect on network performance

Disadvantages of static packet filtering · A big number of access control list (ACL) is difficult to manage and allows IP spoofing

Network Address Translation (NAT) NAT translates private IP addresses to public addresses to hide the source IP address. This technique prevents devices from re-
motely accessing the private network for the organization. Proxy Firewalls Proxy firewalls act as an intermediary between client and server. The connection is usually
between a proxy; then proxy send the same communication to the server (Ciprian, 2019). Advantages · Proxy server insulates the server from attacks as it acts as the
intermediary · Provides elaborative log credentials

Disadvantages · When it fails it poses network security to the entire organization network · Its memory and processor intensive Application gateway

This is a firewall technique that balances traffic for the web application. It is applied to selected applications such as Telnet and FTP servers

Transparent Firewall It functions like a bridge that operates in layer two of the OSI model and can easily be configured without interfering with Internet protocol ad-
dresses. It blinds users from detecting whether there is a firewall. It also performs application inspection (Sharma et al., 2017)

References

Ciprian Rusen ( 2019, April 19).Windows Firewall: your system’s best defense. https://www.howtogeek.com/school/windows-network-security/lesson4/ Sharma, R.

K., Kalita, H. K., &Issac, B. (2017, July). Different firewall techniques: A survey. In Fifth International Conference on Computing, Communications and

Networking Technologies (ICCCNT) (pp. 1-6).IEEE.

1

2

3

2 2 2

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&download=true&includeDeleted=true&print=true&force=true

4/21/2021 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&i… 2/3

Source Matches (10)

Student paper 68%

Student paper 76%

Student paper 83%

Student paper 88%

1
Student paper

Microsoft Windows Firewall Security
Techniques 1 Microsoft Windows Firewall
Security Techniques 4 Microsoft Windows
Firewall Security Techniques

Original source

Microsoft Windows Firewall Microsoft
Windows Firewall Microsoft Windows
Firewall

2
Student paper

A firewall is a networking device that fil-
ters network traffic (data packets) enter-
ing and leaving the network. They create
a barrier between a trusted private net-
work and public networks such as the in-
ternet (Ciprian, 2019) methodologies Sta-
tic packet filtering controls the access
based on the user-defined rules. It does
this by monitoring source IP address,
destination IP address, and port number.
It operates on layers 3 of the OSI model
(Ciprian, 2019).

Original source

It filters network traffic (data packets) en-
tering and leaving the network Firewall
methodologies Static packet filtering con-
trols the access based on the user-de-
fined rules It does this by monitoring
source IP address, destination IP address,
and port number It operates on layers 3
of the OSI model (Geeks for Geeks,2019)
Advantages of static packet filtering

2
Student paper

Advantages of static packet filtering · It’s
easy to implement and configure · Has a
negligible effect on network performance
Disadvantages of static packet filtering · A
big number of access control list (ACL) is
difficult to manage and allows IP spoof-
ing Network Address Translation (NAT)
NAT translates private IP addresses to
public addresses to hide the source IP
address. This technique prevents devices
from remotely accessing the private net-
work for the organization.

Original source

· It’s easy to implement · It has a negligi-
ble effect on network performance · It
can be configured in a variety of routers ·
A large number of access control list
(ACL) is challenging to manage · It allows
spoofing of IP addresses Network Ad-
dress Translation (NAT) NAT translates
private IP addresses to public addresses
to hide the source IP address This tech-
nique prevents devices from remotely ac-
cessing the private network for the
organization

2
Student paper

Proxy Firewalls Proxy firewalls act as an
intermediary between client and server.
The connection is usually between a
proxy; then proxy send the same com-
munication to the server (Ciprian, 2019).
Advantages · Proxy server insulates the
server from attacks as it acts as the inter-
mediary · Provides elaborative log
credentials

Original source

Proxy firewalls act as an intermediary be-
tween client and server The connection is
usually between a proxy then proxy send
the same communication to the server
Advantages · Proxy server insulates the
server from attacks as it acts as the
intermediary

4/21/2021 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&i… 3/3

Student paper 89%

Student paper 77%

Student paper 95%

Student paper 100%

Student paper 100%
Student paper 100%
2
Student paper

Disadvantages · When it fails it poses net-
work security to the entire organization
network · Its memory and processor in-
tensive Application gateway This is a fire-
wall technique that balances traffic for
the web application. It is applied to se-
lected applications such as Telnet and
FTP servers Transparent Firewall It func-
tions like a bridge that operates in layer
two of the OSI model and can easily be
configured without interfering with Inter-
net protocol addresses.

Original source

Disadvantages · When it fails, it poses
network security to the entire organiza-
tion network This is a firewall technique
that balances traffic for the web applica-
tion It is applied to selected applications
such as Telnet and FTP servers Transpar-
ent Firewall It functions like a bridge that
operates in layer two and can easily be
configured without interfering with IP ad-
dresses (Sharma et al.,2016)

2
Student paper

It blinds users from detecting whether
there is a firewall. It also performs appli-
cation inspection (Sharma et al., 2017)

Original source

It blinds users using the networking from
detecting whether there is a firewall It
also performs application inspection

3
Student paper

your system’s best defense.
https://www.howtogeek.com/school/win-
dows-network-security/lesson4/ Sharma,
R.

Original source

Your System’s Best Defense
https://www.howtogeek.com/school/win-
dows-network-security/lesson4/

2
Student paper

K., Kalita, H. K., &Issac, B.

Original source

K., Kalita, H K., & Issac, B

2
Student paper

Different firewall techniques:

Original source

Different firewall techniques

2
Student paper

In Fifth International Conference on Com-
puting, Communications and Networking
Technologies (ICCCNT) (pp

.

Original source
In Fifth International Conference on Com-
puting, Communications and Networking
Technologies (ICCCNT) (pp

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP