Firewalls

Firewalls
Using your favorite search engine, find and research a real world case where this technology is being used. What are your thoughts on the implementation? Could it be improved upon?

Firewalls
Firewall technology is a networking system that is applied in computer systems to prevent unauthorized access over the internet. The real-world case where firewall technology is being used is provided in the Open University system. The figure below presents the firewall arrangement in the university system.

The Open University-wide area network is composed of LANs that are linked to the main LAN at the university headquarter at Walton Hall. The DMZs holds the services required by students allowing the traffic that initiated by internal users or permitted user to cross the firewalls (OpenLearn, 2020). The arrangement of the Open University system allows external access to the Walton Hall LAN through the virtual private network (VPN). The VPN provides authorized users with a logical bypass to the firewall where a one-time password is used for access.
The firewall implementation approach used in the University network system incorporates in the DMZ environment and in VPN. The DMZs in the acts as a neutral zone between the university’s private network and the outside public network by providing access control and protection to the server. The VPN firewall implementation acts as a connection to remote sites by ensuring the network system is encrypted and unauthorized users cannot access the network, and data cannot be intercepted (Dandamudi & Eltaeib, 2015). The improvement on the Open University firewall can be conducted by introducing the application level firewalls and stateful multilayer firewall. The application-level based firewall are application-specific that is configured to provide protection for specific services such as library services. The stateful multilayer firewalls will improve network security through their ability to filter packets at the network layer, evaluating the content of packets, and determining the legitimacy of packets at the application layer.
References
Dandamudi, S., & Eltaeib, T. (2015). Firewalls Implementation in Computer Networks and Their Role in Network Security. Journal of Multidisciplinary Engineering Science and Technology (JMEST). Vol. 2 Issue 3. https://www.jmest.org/wp-content/uploads/JMESTN42350531.pdf
OpenLearn. (2020). Network security. Retrieved from https://www.open.edu/openlearn/science-maths-technology/computing-and-ict/systems-computer/network-security/content-section-9.7#

In need of this or similar assignment solution?
Trust us and get the best grades!
The Benefits You Get With Our Service
What would I want while being a student? This is the way we think to provide quality services. That is why, with our team you get:
Team of high-qualified writers
We believe that only a professional writer can provide perfect homework services. That is why we give them tests to check English level, writing skills and discipline knowledge.
Uniqueness guarantee
The one of the obligatory things for homework is to make it unique. We understand that it is easy to check plagiarism, so every author writes papers from scratch.
Personalized papers
We follow all the customer’s requirements. The more information you give, the more personalized papers will be. No one will find out that you haven’t worked on the homework yourselves.
Free revisions and corrections period guaranteed
We make sure that each work we deliver is perfect, but we always spare our customers the chance to make amendments. All the clients can request free revision and corrections within 10 days after the final version of paper is delivered.
/4