Top Trending Questions

Honeypot Placement without DMZ
For a system without a DMZ, where is the best area in the network to install a honeypot?
130 Views 1 Answers
System Intrusion Detection and Prevention
Discuss as many effective ways of responding to a system intrusion as possible. What are the best? Most implementable? Most cost-effective?
103 Views 1 Answers
Circuit-Level vs. Network-Level Firewalls
What are circuit-level firewalls? How are they different from network-level firewalls?
113 Views 1 Answers
Firewall Services and Protocols
Search and discuss as many services and protocols as possible offered by a modern firewall.
109 Views 1 Answers
Discuss the best ways of protecting an internal network using firewalls from the following attacks: * SMTP server hijacking * Bugs in operating systems * ICMP redirect bombs * Denial of service * Exploiting bugs in applications
Discuss the best ways of protecting an internal network using firewalls from the following attacks: * SMTP server hijacking * Bugs in operating systems * ICMP redirect bombs * Denial of service * Exploiting bugs in applications
99 Views 1 Answers
Firewall Design for File Uploads to Internal Network
How would you design a firewall that would let Internet-based users upload files to a protected internal network server?
106 Views 1 Answers
Firewall Protocol Implementation
Show how data protocols such as TCP, UDP, and ICMP can be implemented in a firewall and give the type of firewall best suited for each of these protocols.
110 Views 1 Answers
Discuss the limitations of firewalls. How do modern firewalls differ from the old ones in dealing with these limitations?
Discuss the limitations of firewalls. How do modern firewalls differ from the old ones in dealing with these limitations?
101 Views 1 Answers
In your opinion, is computer forensics a viable tool in the fight against the cybercrime epidemic?
In your opinion, is computer forensics a viable tool in the fight against the cybercrime epidemic?
107 Views 1 Answers