Friday, September 10, 2010

Week 7 Blog entry

1.Which architecture for deploying a firewall is most commonly used in businesses today? Why?

The most commonly used architecture for deploying a firewall is screened subnet firewalls (with DMZ). The DMZ or Demilitarised zone can be a dedicated port on the firewall device linking a single bastion host or it can be connected to screeened subnet. A common arrangement finds the subnet firewall consisting of two or more internal bastion hosts behind a packet filtering router, with each host protecting the trusted network. Connections from the outside or untrusted network are routed through an external filtering router. Connections from the outside or untrusted network are routed in to and then out of a routing firewall to the separate network segment known as the DMZ.
Screened subnet firewalls are the most commonly used architecteture for various reasons including that it provides flexibility especially for internet based applications, such as e-mail, Web services and e-commerce. It also allows servers that must be accessible to the interent while still protecting back office services on the secure internal network or intranet. The use of the DMZ can harden up the exposed servers by using security Tools and Checklists for server operating systems.
The subnet firewall rather than using only the packet-filtering router as the front door to the DMZ, a second firewall is added behind for further inspection of traffic. These features of a screened subnet firwall (with DMZ) are why it is the most commonly used architecture for deploying a firewall.

2.What are the reasons that VPN technology has become the dominant method for remote workers to connect to the organizational network?

A VPN is a private and secure network connection between systems that uses the data communication capability of an unsecured and public network. VPN's are commonly used to extend securely an organisation's internal network connections to remote locations beyond the trusted network.
Reasons why VPN technology has become the dominant method for remote workers to connect to the organisations network include that it allows employees to safely log into company networks from anywhere. It is extremely convinient for individuals who travel as they can stay connected to the to the corporate intranet over long distances. The VPN allows users to use public networks like the internet rather than to rely on private leased links that are expensive, this alows the organisation to also cut costs. Individuals from the organisation can thus work at customer sites, business partners, hotels and other untrusted locations to access the corporate network safely over dedicated private connections. This comes throught the use of restricted-access networks that utilise the same cabling and routers asd a public network, and they do so without sacrificing features or basic security.

3.Will biometrics involve encryption? How are biometric technologies dependent on the use of cryptography?

Encryption is the process of converting an original message into a form that is unreadable by unauthorised individuals.
Biometrics "is the science and technology of measuring and analysing biological data. In information technology biometrics refers to technolgies that measure and analyse human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns and hand measurements for authentification purposes", (http://searchsecurity.tehtarget.com/sDefinition/0,,sid14_gci21166,00.html). Yes, biometrics will involve encryption. Biometric encryption is the process of using a characteristic as a method to code or scramble/ descramble data. Encrypted biometric information is going to make it very difficult for an attacker to steal or break passwords or personal identification numbers. As biometric data is one of a kind human information it is very difficult to copy and if it is encrypted it is difficult to make this information rreadible by a user.
Cryptography " can be difined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network" (www.barcodesinc.com).
Biometric technologies are dependent on the use of cryptography as it allows Biometric information to be scrambled into code which can be sent across networks.

3 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. Did you heard Ivacy VPN is offering 90% off on their lifetime Subscription for this Christmas only. This is the biggest discount you can get from Ivacy. So What is the wait? Go Buy VPN now from Ivacy.

    ReplyDelete
  3. “Benjamin Briel Lee was very professional at all times, keeping me aware of everything that was happening, If I had any questions he was always available to answer. This was my first home purchase, I didn’t know much about the loan process, he made it very easy to understand the things I had questions about. I really enjoyed working with him.”  
    He's a loan officer working with a group of investor's who are willing to fund any project or loan you any amount with a very low interest.Contact Benjamin Briel Lee E-Mail: 247officedept@gmail.com  Whats-App Number: +1-989-394-3740.

    ReplyDelete