Introductionto Information Assurance and Information Security Assignment 2022
Added on 2022-10-11
7 Pages483 Words22 Views
Introduction to Information Assurance and Information Security Student’s Name Institutional Affiliation
1. State-based Filter How the security method works •It is a network firewall which tracks the operating state and connection features traversing the network. •The firewall is configured to differentiate authentic packets from different connection type. Advantages •They offer improved content filtering abilities because they have the capability to scrutinize the packet payload and make decisions according to real-time content.
2. Demilitarized zones (DMZ) How the security method works A DMZ is an administrative server that is positioned on a network containing several network edges to provide local area network users with secure services. •Advantages •It provides organizations additional time to perceive and address openings before they can further breach into the internal networks (Sadiku, Alam, & Musa, 2017).
End of preview
Want to access all the pages? Upload your documents or become a member.