methodologies that Microsoft Windows firewall uses, Define a firewall. Define firewall security techniques,strengths and weaknesses of the Microsoft Windows firewall
Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall
Write between 200 and 300 words.
4/21/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&i… 1/
3
%100
SafeAssign Originality Report
Computer Security: Foundations – 202130 – CRN164 – Thatal • Week Ten Assignment
%100Total Score: High riskCharani Madala
Submission UUID: d598d98a-f107-6f61-e12b-2094ef1a2905
Total Number of Reports
1
Highest Match
100 %
MicrosoftFirewall x
Average Match
100 %
Submitted on
03/28/21
10:51 PM EDT
Average Word Count
359
Highest: MicrosoftFirewall x
%100Attachment 1
Institutional database (3)
Student paper Student paper
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report – Old Design
Word Count: 359
MicrosoftFirewall x
2 3 1
2 Student paper 3 Student paper 1 Student paper
Microsoft Windows Firewall Security Techniques 1
Microsoft Windows Firewall Security Techniques 4
Microsoft Windows Firewall Security Techniques
Student Name: Institutional Affiliation: Course ID: Instructors Name: Submission Date:
A firewall is a networking device that filters network traffic (data packets) entering and leaving the network. They create a barrier between a trusted private net-
work and public networks such as the internet (Ciprian, 2019) methodologies Static packet filtering controls the access based on the user-defined rules. It does this by
monitoring source IP address, destination IP address, and port number. It operates on layers 3 of the OSI model (Ciprian, 2019). Advantages of static packet filtering ·
It’s easy to implement and configure · Has a negligible effect on network performance
Disadvantages of static packet filtering · A big number of access control list (ACL) is difficult to manage and allows IP spoofing
Network Address Translation (NAT) NAT translates private IP addresses to public addresses to hide the source IP address. This technique prevents devices from re-
motely accessing the private network for the organization. Proxy Firewalls Proxy firewalls act as an intermediary between client and server. The connection is usually
between a proxy; then proxy send the same communication to the server (Ciprian, 2019). Advantages · Proxy server insulates the server from attacks as it acts as the
intermediary · Provides elaborative log credentials
Disadvantages · When it fails it poses network security to the entire organization network · Its memory and processor intensive Application gateway
This is a firewall technique that balances traffic for the web application. It is applied to selected applications such as Telnet and FTP servers
Transparent Firewall It functions like a bridge that operates in layer two of the OSI model and can easily be configured without interfering with Internet protocol ad-
dresses. It blinds users from detecting whether there is a firewall. It also performs application inspection (Sharma et al., 2017)
References
Ciprian Rusen ( 2019, April 19).Windows Firewall: your system’s best defense. https://www.howtogeek.com/school/windows-network-security/lesson4/ Sharma, R.
K., Kalita, H. K., &Issac, B. (2017, July). Different firewall techniques: A survey. In Fifth International Conference on Computing, Communications and
Networking Technologies (ICCCNT) (pp. 1-6).IEEE.
1
2
3
2 2 2
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&download=true&includeDeleted=true&print=true&force=true
4/21/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&i… 2/3
Source Matches (10)
Student paper 68%
Student paper 76%
Student paper 83%
Student paper 88%
1
Student paper
Microsoft Windows Firewall Security
Techniques 1 Microsoft Windows Firewall
Security Techniques 4 Microsoft Windows
Firewall Security Techniques
Microsoft Windows Firewall Microsoft
Windows Firewall Microsoft Windows
Firewall
2
Student paper
A firewall is a networking device that fil-
ters network traffic (data packets) enter-
ing and leaving the network. They create
a barrier between a trusted private net-
work and public networks such as the in-
ternet (Ciprian, 2019) methodologies Sta-
tic packet filtering controls the access
based on the user-defined rules. It does
this by monitoring source IP address,
destination IP address, and port number.
It operates on layers 3 of the OSI model
(Ciprian, 2019).
Original source
It filters network traffic (data packets) en-
tering and leaving the network Firewall
methodologies Static packet filtering con-
trols the access based on the user-de-
fined rules It does this by monitoring
source IP address, destination IP address,
and port number It operates on layers 3
of the OSI model (Geeks for Geeks,2019)
Advantages of static packet filtering
2
Student paper
Advantages of static packet filtering · It’s
easy to implement and configure · Has a
negligible effect on network performance
Disadvantages of static packet filtering · A
big number of access control list (ACL) is
difficult to manage and allows IP spoof-
ing Network Address Translation (NAT)
NAT translates private IP addresses to
public addresses to hide the source IP
address. This technique prevents devices
from remotely accessing the private net-
work for the organization.
Original source
· It’s easy to implement · It has a negligi-
ble effect on network performance · It
can be configured in a variety of routers ·
A large number of access control list
(ACL) is challenging to manage · It allows
spoofing of IP addresses Network Ad-
dress Translation (NAT) NAT translates
private IP addresses to public addresses
to hide the source IP address This tech-
nique prevents devices from remotely ac-
cessing the private network for the
organization
2
Student paper
Proxy Firewalls Proxy firewalls act as an
intermediary between client and server.
The connection is usually between a
proxy; then proxy send the same com-
munication to the server (Ciprian, 2019).
Advantages · Proxy server insulates the
server from attacks as it acts as the inter-
mediary · Provides elaborative log
credentials
Original source
Proxy firewalls act as an intermediary be-
tween client and server The connection is
usually between a proxy then proxy send
the same communication to the server
Advantages · Proxy server insulates the
server from attacks as it acts as the
intermediary
4/21/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=ac173e90-5ffa-445a-af41-e61b266514a1&course_id=_53396_1&i… 3/3
Student paper 89%
Student paper 77%
Student paper 95%
Student paper 100%
Student paper 100%
Student paper 100%
2
Student paper
Disadvantages · When it fails it poses net-
work security to the entire organization
network · Its memory and processor in-
tensive Application gateway This is a fire-
wall technique that balances traffic for
the web application. It is applied to se-
lected applications such as Telnet and
FTP servers Transparent Firewall It func-
tions like a bridge that operates in layer
two of the OSI model and can easily be
configured without interfering with Inter-
net protocol addresses.
Original source
Disadvantages · When it fails, it poses
network security to the entire organiza-
tion network This is a firewall technique
that balances traffic for the web applica-
tion It is applied to selected applications
such as Telnet and FTP servers Transpar-
ent Firewall It functions like a bridge that
operates in layer two and can easily be
configured without interfering with IP ad-
dresses (Sharma et al.,2016)
2
Student paper
It blinds users from detecting whether
there is a firewall. It also performs appli-
cation inspection (Sharma et al., 2017)
Original source
It blinds users using the networking from
detecting whether there is a firewall It
also performs application inspection
3
Student paper
your system’s best defense.
https://www.howtogeek.com/school/win-
dows-network-security/lesson4/ Sharma,
R.
Original source
Your System’s Best Defense
https://www.howtogeek.com/school/win-
dows-network-security/lesson4/
2
Student paper
K., Kalita, H. K., &Issac, B.
Original source
K., Kalita, H K., & Issac, B
2
Student paper
Different firewall techniques:
Original source
Different firewall techniques
2
Student paper
In Fifth International Conference on Com-
puting, Communications and Networking
Technologies (ICCCNT) (pp
.
Original source
In Fifth International Conference on Com-
puting, Communications and Networking
Technologies (ICCCNT) (pp