Application Based Firewalls: Features, Risks & Mitigation - Board 5

Verified

Added on  2023/06/11

|4
|567
|295
Discussion Board Post
AI Summary
This discussion board post discusses the importance of installing an application-based firewall on a personal workstation. It identifies Arachni as a potential firewall, highlighting its core features such as custom header support, agent spoofing, proxy support, cookie jar support, SSL support, and automatic logout detection. The post also elaborates on the risks and threats mitigated by Arachni, including insider threats and phishing attacks. Furthermore, it includes replies to two students, one discussing web-based firewalls like ZoneAlarm and the other focusing on PeerBlock for file-sharing security. Each response includes a brief description of the chosen firewall and its benefits in preventing cyber threats. The assignment emphasizes the need for robust security measures in personal and enterprise networks, offering practical examples and solutions for mitigating potential risks.
Document Page
Running head: DISCUSSION BOARD
Discussion Board 5
Name of Student-
Name of University-
Author’s Note-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DISCUSSION BOARD
Part 1: Main Discussion Board Post
The firewall that is installed is Arachni for application based security scanner. The
Arachni is feature full as well as modular framework with high performance that helps to
penetrate the testers as well as administrators that helps to access security of the web application.
The Arachni firewall is a smart framework that examines as well learns from the action of web
application. Arachni can also perform meta-analysis using many factors so that they can access
trustworthiness of all the results correctly and also identify false positive. There are many
features of the Arachni firewall are as follows:
There is support of customer header.
Agent spoofing of user.
Provides proxy support for HTTP/1.1, HTTP/1.0, SOCKS4, and SOCKS5.
Also provides proxy authentication.
Cookie jar support.
Provides SSL support with fine grained options.
Custom header support.
Detection of automatic logout.
404 page detection.
Site authentication that are SSL based or form based.
Stop or resume functionality.
The high area of risks and threats that Arachni firewall can mitigate are stated below.
Document Page
2DISCUSSION BOARD
The firewall helps to mitigate the insider threat in an organization or in some personal
network. The insider threat comes from misusing the sensitive data that includes leakage
of data to the suppliers.
Phishing is another threat that can be mitigated by the Arachni firewall. Phishing is a data
breach that is an attack of spear emails to the victims. Humans can build up relationships
with each other and the hackers target those behavior patterns to target the victim. Spear
phishing helps to hackers to understand the target in depth.
Part 2: Discussion Board Replies
Student1-
Web based firewalls
According to me, web based firewalls are for monitoring, filtering, and blocking the data
packets while transmission in web application. These networks are deployed via proxy and are
placed in more than one web application. The web based firewalls are security control that are
used by the individuals or the enterprises for protecting the web applications against
exploitations. I am using a ZoneAlarm Free Firewall for securing my computer. This is an anti-
virus suite that also provides mobile security for the android devices and also provides services
for many premium products. The firewall that I am using hides all the ports of my system that
prevents attack.
Student 2-
Web based Firewall
Document Page
3DISCUSSION BOARD
The firewall that I use to prevent my computer system is the PeerBlock firewall. This
firewall is a fork of the PeerGuardian firewall. As I handle a lot of file sharing in my computer,
so I use this firewall security to protect all my files from being hacked. This firewall keeps my
system safe while I am using the torrent software. The setup of this firewall is very simple. After
launching this firewall in to the network system, this will let the user to choose the type of
websites that the user wants to block thus keeping the system safe.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]