List one of the technologies used to combat computer crimes and discuss its strengths and weaknesses.

Authors Avatar

Question:

1. List one of the technologies used to combat computer crimes and discuss its strengths and weaknesses.

Securing a computer system or a network from inside or outside threats is a matter of, first identifying those threats than identifying the value of what we are protecting, and then implementing appropriate mechanisms or technologies to reduce the risk to an acceptable level, why an acceptable level?. The reason is there is no a zero tolerance system and if such a system exists it becomes unusable even for legitimate users.

In this report I’ll be talking about firewalls and their use to protect our networks and PC’s from intruders.  First a firewall is a system or group of systems that enforces an access control policy between two networks or PC’s. and it consists of two parts the first one to block traffic, and the other one permits traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. Otherwise the user of this technology has to determine what kind of access he wants to allow or to deny. Then he can start configuring it.

But why do we need a firewall?. from my experience I believe that as there is no way to stop those people who have nothing to do but wasting time and money for other people, who are trying to do their work or deliver information to others through the internet, so a firewall is very helpful for them as it keeps intruders out of the network while legitimate users could finish their work.

After knowing the need for a firewall we can start working on designing one, but we talked before we need to define policies for our application, as the firewall will be filtering the traffic or allow services to be delivered to users so it’s better to define a network policy or a service access policy than we can define our firewall design policy, the two basic rules are: permit any service unless it is expressly denied, or/and deny any service unless it is expressly permitted. A firewall that implements the first rule allows all services to pass into the site by default, with the exception of those services that the service access policy has identified as disallowed that’s why it’ s less desirable as users could access unlisted services. a firewall that implements the second rule denies all services by default, but then passes those services that have been identified as allowed. This second rule follows the classic access model used in all areas of information security for this reason this rule is safer but very difficult to implement.

Join now!

Now after defining a policy we can go and purchase or design our firewall, usually big organisations build their own firewall as it takes time and cost more money but the designers understand better the specifics of the design and the use of the application.

The type of firewall we have to choose will depend on its location in the network

so if it was intended to filter traffic coming from outside by checking for example the IP address of the source and destination, MAC address and  port number this type is called Network Firewall but ...

This is a preview of the whole essay