logo

Introductionto Information Assurance and Information Security Assignment 2022

   

Added on  2022-10-11

7 Pages483 Words22 Views
Introduction to Information Assurance and Information Security
Student’s Name
Institutional Affiliation
Introductionto Information Assurance and Information Security Assignment 2022_1
1. State-based Filter
How the security method works
It is a network firewall which tracks the operating state and connection features
traversing the network.
The firewall is configured to differentiate authentic packets from different connection
type.
Advantages
They offer improved content filtering abilities because they have the capability to
scrutinize the packet payload and make decisions according to real-time content.
Introductionto Information Assurance and Information Security Assignment 2022_2
2. Demilitarized zones (DMZ)
How the security method works
A DMZ is an administrative server that is positioned on a network containing
several network edges to provide local area network users with secure services.
Advantages
It provides organizations additional time to perceive and address openings before
they can further breach into the internal networks (Sadiku, Alam, & Musa, 2017).
Introductionto Information Assurance and Information Security Assignment 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.