Technical Analysis of a Threat Essay examples

Technical Analysis of a Threat Essay examples

Length: 1271 words (3.6 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

1. Introduction
The Cisco 5540 Adaptive Security Appliance ASA is a best-of-breed product that provides perimeter security and remote access to users through VPN. This paper will discuss the firewall and VPN classifications and protocols of the Cisco 5540 ASA. The paper will discuss the strengths, weaknesses and effectiveness of the appliance and its architecture.
2. Cisco 5540 Adaptive Security Appliance ASA
The Cisco 5540 ASA is a good blend of proven network security and network availability. The Cisco 5540 Adaptive Security Appliance ASA is a combined firewall and VPN solutions. The appliance is rated for small to medium size businesses and is designed for installation on the Internet edge (Cisco ASA 5500 Series Adaptive Security Appliances, n.d.). The appliance has optional modules that perform anti-virus and intrusion prevention services.
3. Technical Classifications and Specifications
Firewall
The Cisco 5540 ASA is classified as a transparent firewall. The ASA combines the best of packet filtering, screened host, dual-homed host and screened subnet firewalls into one product. The Cisco 5540 ASA has two firewall modes of operation (PIX/ASA Security Appliance FAQ, n.d.). Routed mode performs packet inspection and forwarding based on layer 3 or Network header information (PIX/ASA Security Appliance FAQ, n.d.). The preferred operational mode of the firewall is transparent mode in which the firewall operates as a layer 2 or data link bridge (PIX/ASA Security Appliance FAQ, n.d.). In transparent mode, the firewall can use an IP access lists and it can inspect IP activity at any layer (PIX/ASA Security Appliance FAQ, n.d.). The Cisco 5540 ASA allows network managers to segment traffic into security zones, i...


... middle of paper ...


...p://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_brochure0900aecd80402ef4.html
Cisco Intrusion Prevention System - Products & Services - Cisco Systems. (n.d.). Cisco Systems, Inc. Retrieved April 18, 2011, from http://www.cisco.com/en/US/products/sw/secursw/ps2113/index.html
Dotson, J. (2007). The Self-Defending Network | BizTech.BizTech Magazine: Small Business Technology Solutions. Retrieved April 17, 2011, from http://www.biztechmagazine.com/article/2008/01/self-defending-network
Snyder, J. (2006). Cisco hits on firewall/VPN, misses on ease of use. Network World. Retrieved April 15, 2011, from http://www.networkworld.com/reviews/2006/050106-cisco-test-asa.html
Snider, J. (2007). Cisco ASA5540 with SSM-20 IPS module. Network World. Retrieved April 15, 2011, from http://www.networkworld.com/reviews/2007/111207-utm-firewall-test-cisco.html

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Potential Entrants Threats : Threat Of New Entrants Essay

- Potential Entrants Threats: Threat of new entrants is relatively low. Provided that Hooker Furniture was incorporated in 1924 and “ranked among the nations top 10 largest publically traded furniture sources based on 2013 shipments to the U.S”, while it is not impossible, it is highly unlikely that a new entrant would be able to compete with an organization as established and resourceful as Hooker 90 years in the business. Bargaining Power of Buyer Opportunities: Strong customer service and relations....   [tags: Customer service, Customer, Technical support]

Strong Essays
1190 words (3.4 pages)

The Significance of Technical Escort Units in a Post 9-11 WMD Domain Essay

- In a Post 9-11 WMD Environment The world is changing, becoming smaller and more dangerous it seems, and the events of September 11th, 2001, brought a distinct reality crashing down around us. The reality was that we could be hit on the home front, after all. The enemy determined to do so harbors zero concern for the “rules of war” and will stop at nothing to inflict the greatest amount of carnage and casualties possible. As the government and Department of Defense has worked to adapt and respond, there is one Army occupational specialty that has become increasingly relevant....   [tags: environment, safety, danger, attacks]

Strong Essays
1412 words (4 pages)

Weapons Of Mass Destruction The Defense Threat Reduction Agency Essay

- Throughout the century mankind has been in countless wars and with each passing war weapons have become more lethal and creative. In ancient days armies fought with smoke screens and toxic fumes, throughout the years methods of destroying other armies in one fell swoop has become an ultimate goal. In the outbreak of World War I and World War II armies developed phosgene, chlorine, mustard gas and nerve agents (Hersh, 1968, pg 7). Nuclear weapons were also developed in WW II, with so many threats the United States had to shield and protect itself (Davis, Purcell, 2006 pg 3)....   [tags: World War II, United States, Nuclear weapon]

Strong Essays
1087 words (3.1 pages)

Cyber-Communism: The New Threat in the New Millennium Essay

- Cyber-Communism: The New Threat in the New Millennium My expedition into cyber-communism began when I read Brock Meeks' "Hackers Stumble Toward Legitimacy"[1]. The article addressed a recent hackers' convention. Interestingly, the keynote speaker was Eric Boucher[2] (alias Jello Biafra[3]), a rock star with no technical background. Numerous questions ensue. Who is Eric Boucher (alias Jello Biafra). What does he believe. More importantly, why schedule someone with no technical background to speak at a hackers' convention....   [tags: social issues]

Free Essays
1033 words (3 pages)

The Threat Of North Korea Essays

- It is a Monday morning the first thing seen at work is the logged in computers all with a creepy fiery skeleton. It was like something out of a scary movie, yet this was the case on November 24, 2014 for Sony Pictures Entertainment staff members. All the while standing there, the hacker group Guardian of Peace, had a malware going through all the computers, stealing, erasing sensitive information, and destroying most of the networking at Sony. Although Sony Picture Entertainment was hacked there is still hasn’t been a conclusive answer if North Korea were behind the cyber-attack....   [tags: North Korea, South Korea, Ban Ki-moon, Korea]

Strong Essays
892 words (2.5 pages)

The Wallace Group Case Analysis Essay

- The Wallace Group Case Analysis Introduction The Wallace Group is a diversified company that deals in the manufacture and development of technical products and systems. The company consists of three primary operating groups, electronics, plastics, and chemicals. The electronics group is by far the largest, its size is approximately the size of the plastics and chemical groups combined. Of the $70 million in net sales, the electronics groups contributed about $35 million of that, with plastics contributing $20 million and the remaining $15 million coming from the chemical group....   [tags: Business Analysis]

Strong Essays
1926 words (5.5 pages)

Essay on Nuclear Reactor Vendor Industry Analysis

- Nuclear Reactor Vendor Industry Analysis (graphics not available) Industry overview During the first ten years after its commercial introduction in 1956, the growth of nuclear power production was exponential, as would be expected for a new energy source. It then slowed down progressively to 10.9% a year by 1990, and has continued downwards to 1.8% a year in 2005 . It is however expected to rise again in the years to come , mainly because of the rise of the electricity demand worldwide (particularly in rapidly-developing countries), the awareness of the importance of energy security and the need to limit carbon emissions due to concern about global warming....   [tags: Industry Analysis]

Free Essays
1718 words (4.9 pages)

Essay about The Role Of Situation Analysis For A Marketing Plan

- Situation analysis becomes increasing important for a marketing plan development. This essay aims to explain why it is so important and what factors it focus on and finally, a guild list is present and justify for the construction of an effective situation analysis for a Marketing Plan of J Boag & Son Brewery. Analyzing situation prior a strategic decision is critical for generating or sustaining competitive advantages, especially when facing the dynamic environmental trend which can affect corporations’ performance positively or negatively....   [tags: Business Marketing Analysis]

Free Essays
1445 words (4.1 pages)

Environmental Analysis Of Dell Organization Essay

- Environmental Analysis of Dell Organization Industry Environment Competitive Rivalry The competitors to Dell are as follows: Hewlett-Packard, IBM, and Sun Microsystems (Hoovers). HP and IBM pose the biggest threat in competition. Dell's sales overview has increased each year except for 2001 to 2004. In 2001 the annual sales in millions were $31,888 and a major increase in sales in 2004 at $41,444.0. (Hoovers). In terms of Entry Barriers, Dells direct to consumers sales approach has increased their sales each year and they will soon be among their top competitors....   [tags: Computer Technology Market Analysis Dell]

Free Essays
1021 words (2.9 pages)

Essay about IBM Case Analysis

- IBM Case Analysis The International Business Machines Corporation, IBM, is the world’s largest information technology company, with 80 years of leadership in helping businesses innovate. Drawing on resources from across IBM and key Business Partners, IBM offers a wide range of services, solutions and technologies that enable customers, small, medium, and large, to take full advantage of the new era of e-business. This paper will present a brief overview of the company, including a brief SWOT analysis, and a review of the marketing, management, and financial aspects of the firm....   [tags: Business Marketing Management Analysis Strategy]

Strong Essays
1699 words (4.9 pages)