Practical Connection

  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of the course you are enrolled in have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting is required. References are not required, but if you wish to bolster your paper with supporting evidence from outside documents and articles, please make sure that proper APA formatted citations and references are used to support your writing. 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

· You could share a personal connection that identifies specific knowledge and theories from this course. Maybe friends of friends – people you don’t really know – come to your residence and ask for your WiFi password. Maybe you share your Netflix credentials with a close friend, but you don’t know who they are sharing it with afterwards. Do you change your own passwords regularly?

· You could also demonstrate a connection to your current work environment. Maybe you use 2-factor authentication at work. Maybe you must change your passwords every 90 days. Maybe you regularly work at home over your company’s VPN. Does it work well? Or is it just easier to go to work? If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Afirewall enforces your organization’s network security policy. Specifically, a firewall enforces the network traffic access control security policy. A firewall is the physical embodiment of the security policy (Stewart, J. M). A firewall stands as a sentry, as a front guard, as a defense against all attacks and attempts at system compromise(Stewart, J. M). The good news is that many firewalls are well hardened against all known-to-date attacks. These firewalls can withstand the blitzkrieg of the attacks without faltering (Stewart, J. M). A firewall protects the network against the substantial asset damage that external attacks can cause (Stewart, J. M).

Your personal computer needs a firewall. Your home network needs firewalls. Your company network needs firewalls. Every network needs firewalls. They are a fundamental of network communication.(Stewart, J. M). Computers and networks are online all the time—and exposed to attacks. A drawbridge is easy to cross if it’s always down. When a system is always connected, it can be the focus of a concerted attempt to discover its vulnerabilities and breach its security (Stewart, J. M). Most systems are detected, scanned, and probed within minutes of obtaining a public IP address. It is technical suicide to connect your system to the Internet before installing a firewall, as well as installing the latest vendor patches for the hardware, OS, and installed applications (Stewart, J. M). A hardware firewall can protect a single host or a network of hosts, while a software firewall can protect only a single host. host firewall also protects the network from a user in general. A user is the most risky element in a network infrastructure. Firewalls protect against Internet threats, protect against internal network threats, protect resources generally, and protect against the risk of users. These capabilities alone might make installing a firewall on every host and on every segment seem like the obvious follow through(Stewart, J. M).

A zone of risk is any segment, subnet, network, or collection of networks that represents a certain level of risk. The zones of risk is zones of trust. Highly trusted zones naturally require less security, while zones of low trust require more protection. Most networks have two to four zones of risk. These include the private network, DMZ, extranet, and the Internet. The private network zone has the lowest risk and is the zone of the highest trust. The Internet zone has the highest risk and is the zone with the least trust. A DMZ has less risk than the Internet, but is not as trusted as the private network. Your organization’s written security policy should define where these zones exist and dictate the security requirements for each zone. Such requirements would include traffic management, use of firewalls, use of VPNs to cross the zone divisions, hardening of systems, malicious code scanning, and so on

A firewall is an essential part of network security. However, it’s not the whole of network security. A firewall is primarily for network traffic filtering. It’s not an authentication system. A firewall is not a remote access server. Instead, the endpoint is a remote access server (RAS) or network access server (NAS). A firewall may function before or after the RAS/NAS to filter remote access traffic. However, that doesn’t mean the firewall is the RAS/NAS itself. since the original header is in plaintext form. However, a firewall cannot filter the original header of traffic using tunnel mode encryption, since the only plaintext component is a temporary tunnel header that only includes information about the endpoints of the tunnel. A firewall is also not a malicious code scanner.A firewall is also not an intrusion detection system. A common misconception is that firewalls protect against insider attacks. They cannot. Another thing firewalls can’t do is protect against social engineering. Social engineering is the category of attacks that focus on the personnel of an organization.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP