Wednesday, May 6, 2020

IFIP Networking Conference System †Free Samples to Students

Question: Discuss about the IFIP Networking Conference System. Answer: Introduction Information Security is very much important for securing any kind of data. Though there are various ways to secure the data but still there lies some loopholes which can lead to leaking of data. The following report discusses about how firewalls can help in securing the data. Advantages Uses the current network routers for the filtering of packets Due to this, security becomes more transparent for the end users. It is quite easy when it comes to installation As it generally works on the current network system therefore implementing the packet security filter on the system becomes less complicated than any other method. It is also quite fast than any other firewall technologies present as in this, very few evaluations are performed therefore it becomes quite easy to maintain and handle too. Disadvantages These do not generally understand the protocols for application layer. It does not offer any value added features like the URL filtering. These are not very secure while using on a large scale. As there is no user based Authentication, it cannot authenticate the information that are coming from various users. Suggestions The technology is acceptable when it is over a small network but when considering a large organization, it is not that safe to use as it cannot track the users from whom the information is coming so it is better not to use. Above all, it allows every data to pass through as it cannot discriminate among the different types of packets (Diekmann et al., 2016). It can be overcome by adding extra features like authentication based system where no one can enter the network without proper authentication. It helps in setting up a standardized environment that is helpful for transparency and securing of the firewalls. It also intercepts between the TCP and UDP connection and later transforms them into SOCKS format. Communication that is possible with SOCKS is restricted within SOCKS clients and its server ("RFC 1928 - SOCKS Protocol Version 5", 1996). Tunneling helps in defining security and also helps in proving authentication as well as confidentiality and integrity. It also helps in combining the possibilities in the circuit level. In order to work properly, the client needs to make modification to the SOCKS ("RFC 1928 - SOCKS Protocol Version 5", 1996). Conclusion From the above discussion, it can be concluded that data security is very much important and a good practice as it helps in securing the data from any kind of theft. There are a few advantages as well as disadvantages on using the firewall as it is mainly used for small networks and in order to use it for any large scale business, it needs to be incorporated with various other features so as to work with more ease. References Diekmann, C., Michaelis, J., Haslbeck, M., Carle, G. (2016, May). Verified iptables firewall analysis. InIFIP Networking Conference (IFIP Networking) and Workshops, 2016(pp. 252-260). IEEE. RFC 1928 - SOCKS Protocol Version 5. (1996). Tools.ietf.org. Retrieved 9 May 2017, from https://tools.ietf.org/html/rfc1928

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.