Distinguish between the following types of firewalls without using the words themselves in your answer (static dynamic state stateful stateless): (6 pts) Q: Suppose you have a file named as test.log and as a security administrator you want to keep up to date about the updates in that file and save the updated data to a file named as test_saved.log on runtime without losing previous data in test_saved.log. How would you do that? (4 pts) Ans: Q: What is the difference between NIDS and HBIDs? (No more than two lines) (2 pts) Q: Define the main components of an IPS in hierarchal manner representing which part requires input from what other parts. (name and 1 line each part) (3 pts) Ans: Q: Install a firewall management library of your own choice using terminal.(5 pts) Take a screenshot of empty firewall rule base Block all FTP traffic coming in the machine Block port that caries FTP traffic Take screenshot of updated rule base Q: Suppose there are two users (1 & 2) and three assets (11 12 & 13). And a binary function is used to represent access rules and map userâ€™s access to assest for example R(111) which takes in 2 arguments a user and an asset and maps it to true or false decision. To represent that an access must be blocked in logical language we use negation function NOT (R(111)) which means the access of asset 11 to user 1 is restricted. Using this method an access policy configuration can then be represented as conjunction (&) of different rules for example: Conf1 = R(111) & R(112) & R(113) & R(211) & R(212) & R(213) In above example configuration 1 shows that all the users have access to all the assets. Now following same principle write down all the configurations in which all access request from user 2 are blocked. (5 pts) Ans: Q: Consider again the previouse emample. Conf1 = R(111) & R(112) & R(113) & R(211) & R(212) & R(213) In above example configuration 1 shows that all the users have access to all the assets. Now assume that the administrator must change/optimize access control by changing access configuration against a risk value which comes from a function Threat(111) = which can be maped to a value between 0 to 1 depending upon the situation. Our acceptable risk threashold is 0.75 which means if the value of function Threat(111) becomes greater than or equal to bearable threashold (0.75) the corresponding access must be revoked. Now bieng a security admin you are incharge for observing the threat values and selecting correspoding configurations. At time t=0 the current configuration is: Conf1 = R(111) & R(112) & R(113) & R(211) & R(212) & R(213) At time t=1 you received a warning along with folowing threat values: Threat(1 11)=0.8 Threat(1 12)=0.89 Threat(1 13)=0.75 Threat(2 11)=0.75 Threat(2 12)=0.75 Threat(2 13)=0.6 At time t=20 you received a warning along with folowing threat values: Threat(1 11)=0.6 Threat(1 12)=0.89 Threat(1 13)=0.75 Threat(2 11)=0.75 Threat(2 12)=0.75 Threat(2 13)=0.69 At time t=30 you received a warning along with folowing threat values: Threat(1 11)=0.6 Threat(1 12)=0.89 Threat(1 13)=0.75 Threat(2 11)=0.75 Threat(2 12)=0.79 Threat(2 13)=0.7 Write down all the configurations which can be permitted on T=10 T=20 and T=30 (5 pts)
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.Read more
The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.Read more
The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.Read more
By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.Read more