Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

EH A1 week 5: Describe the role and purpose of the router, firewall, DMZ, IDPS,

ID: 3585267 • Letter: E

Question

EH A1 week 5: Describe the role and purpose of the router, firewall, DMZ, IDPS, and honeypot within a network - include a specific focus on how each helps protect the network from being hacked from both inside and outside the network.

Assignment Objectives:

1.Configure security devices and procedures to counter malicious hacking activities.

2.Analyze firewall technology and tools for configuring firewalls and routers.

3.Discuss intrusion detection and prevention systems and Web-filtering technology.

4.Explain the purpose of honeypots.

Explanation / Answer

The router is a network device .
The main function of the router is that forwards
data packets between the network computing.
Then the router helps to perform the traffic directing
function on the internet.
The router connects the two or more data lines from
various networks.
The routers belong to both hardware devices and
software based.
Many compaines manufacturing security oriented routers.
The router contain overall security of the local
network.
A router contains firewall,VPN handling and some
some security functions.
Routers also did network address translation and
stateful packet inspection.

Firewall:
a firewall is used for bridge between a network and
security policy.
Firewall has become very popular on the internet.
A firewall can prevents unauthorized access in
a private network.
To save money on the small components and only in machines
to trust each other.
The firewall can be used in every device on the network.

DMz:
DMZ is a physical network that separates the
LAN from different untrusted networks.
DMz will provides security for computer network
because it restricts the hackers to access directly
internal server and information through net.

IDPS:

IDPS is used for both ips and ids technologies.

ids is used for automates the instrusion detection process.
IPS is helpful to stop possible incidents.

honeypots;
honeypots is used for mitigate risks in the
computers and networks.
Honeypots provides prevention,detection and response.
Honeypots is a powerful tool to capture details
from the attackers.

1.Security technology protect against all malicious
files.Firewall protect the computer against malware
and hacker attacks.

2.Firewall gives protection to the computer and router handles the traffic sent to the
IP address.

3.

IDPS:

IDPS is used for both ips and ids technologies.

ids is used for automates the instrusion detection process.
IPS is helpful to stop possible incidents.

4.

honeypots;
honeypots is used for mitigate risks in the
computers and networks.
Honeypots provides prevention,detection and response.
Honeypots is a powerful tool to capture details
from the attackers.