Carlos Amaya Hands-On Project 9-1 Using GlassWire Firewall
.docx
keyboard_arrow_up
School
Ivy Tech Community College, Indianapolis *
*We aren’t endorsed by this school
Course
105
Subject
Computer Science
Date
Apr 27, 2024
Type
docx
Pages
1
Uploaded by ChiefWrenMaster426 on coursehero.com
Carlos Amaya Ivy Tech Community College
CSIA 105
2/17/2024
Hands-On Project 9-1: Using GlassWire Firewall
9. Click Apps. What information is given in the left pane? How can this be useful?
It shows the current apps that are currently running on my computer. This can help with monitoring traffic on various applications and track traffic.
12. Use your web browser to surf the web, and watch the GlassWire screen as well. What can you learn from this?
All of the traffic is being pulled by my activity when using the browser.
14. Click the Firewall button. What apps or services have recently gone through your firewall?
The only thing for me was my Microsoft edge browser as I had recently bought this app and started using not too long ago.
16. Click Alerts. Scroll through any alerts that have been issued. What can you tell about them?
They seem to indicate the moments that applications on my laptop are accessing my network along with the time from when I first connected to my network.
17. How valuable is this information from GlassWire?
GlassWire.com offers helpful tools for keeping an eye on your network and making sure it stays safe. Their software lets you see what's happening on your network, spot any security threats, and get alerts if something unusual is going on. It's easy to use, with features like a firewall and malware detection, and it keeps track of what's been happening on your network over time. This kind of information is great for anyone who wants to understand their network better and keep it secure. The value of GlassWire's software depends on how well it fits your needs and how important network security is to you.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Hi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you.
Question 6:
What are some ways to configure a firewall?
arrow_forward
In reference to network access control, describe some of the access control mechanism used by a network administrator to filter, inspect and detect different forms of traffic. The textbook mentions at least three of them, including firewalls, IDSs, and IPSs. Briefly describe what is the purpose of each and how they operate. What do you think are the advantages and challenges of each of these devices. Make sure to elaborate on your answer.
arrow_forward
Hi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you.
Question:
What is a virtual firewall? Explain some of the uses.
arrow_forward
Hi, I need the answer to this question. The name of the book is "Network Security, Firewall, and VPNs e2". Thank you.
Question:
What should you allow and what should you block when setting up a firewall? Why?
arrow_forward
Explain how firewalls safeguard your company. How do hardware and software firewalls compare? What's your company's network security rating? Can I circumvent site filtering?
arrow_forward
Discuss how firewalls may help your company's security. What are the benefits and drawbacks of both software and hardware firewalls? What software do you use to evaluate the security of your company's computer network? What are the most effective ways to get around web filtering software?
arrow_forward
cybersecurity course question
The liber8tion group has recently started a new malicious cloud service, can you get access to it?Note: Your scope is limited to HTTPS
web page: https://9b766570c8933592180288521cdbc015-hyperdash.web.cityinthe.cloud/
What is the code used to get beta access?
What is the flag?
arrow_forward
Hi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you.
Question:
What is a TOR application and its functions?
arrow_forward
Hello, I need to answer this question. Wich is the book name: "Network Security, Firewalls, and VPNS 2e". Thank you.
Question:
Describe the motivation of hackers and other malicious computer network intruders. Can knowing a hacker's motivation help to protect against the hacker's actions? Why or why not?
arrow_forward
Topic: Remote code execution vulnerability in HSMX internet gateway
IN YOUR OWN WORDS, please provide detailed Background information about the case and its history I have already read what is already written up. I am looking for an answer from a different point of view/perspective.
Do not copy from another source or I will report the answer and the person who answered.
arrow_forward
Defend the value of firewalls in preventing cyber attacks on your company. I was wondering if someone could explain the pros and cons of firewall protection, both physical and virtual. How do you assess the safety of your company's network, and what program do you use to do so? How do you recommend evading web filters?
arrow_forward
Question M .A firewall allows the organization to:
enforce a security policy on data exchanged between its network and the Internet.
create access rules for a network.
check the accuracy of all transactions between its network and the Internet.
create an enterprise system on the Internet.
check the content of all incoming and outgoing e-mail messages.
Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
arrow_forward
Hi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you.
Question 5:
What are some firewall implementation best practices?
arrow_forward
Hello, I need to answer this question. Wich is the book name: "Network Security, Firewalls, and VPNS 2e". Thank you.
Question:
Explain what are some of the various types of malicious code (malware) and what the security concerns about them are. Are we, as security professionals, meeting the challenge of protecting against these threats? Why or why not?
arrow_forward
Explain how firewalls protect businesses. What should be considered while choosing hardware or software firewalls? Which application does your firm use to assess network security? Which online content-filtering bypass techniques work best?
arrow_forward
Explain how firewalls protect businesses. What should be considered while choosing hardware or software firewalls? Which application does your firm use to assess network security? What are the best ways to circumvent online content filtering?
arrow_forward
VoIP calls generate more firewall issues than streaming music, right? A 932
arrow_forward
Hi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you.
Question:
What are considered some best practices for firewall management? Explain.
arrow_forward
Firewalls defend your enterprise. Why should one choose hardware or software firewalls? What are their pros and cons? What IT infrastructure security software does your company use? Can you circumvent a website's web filtering?
arrow_forward
Firewalls do what?I'm writing packet-filtering software. What are my requirements?
arrow_forward
Your company's internet-facing systems are under a massive DDoS attack, which is preventing customers connecting to your web site to place orders or obtain services.
You convene an incident response team, consisting of the CEO, CIO, CISO and CFO, all sitting around the boardroom table. Each of you has a laptop which is showing instant messages from the SOC team, emails from other people like the web site administrators, the customer service centre staff and from major customers. Your cellphones are ringing continually with updates from your various departments, and the Polycom conferencing system phone in the middle of the table is ringing every minute or two as well.
What is the best thing you can do next?
Select one:
a. Use an OODA loop to prioritize your responses
b. Switch all your devices off and each separately work on one aspect of the problem
c. Discuss each message among yourselves before responding
d. Have the SOC provide you with a list of the IP addresses originating the…
arrow_forward
What's a firewall for? What distinguishes it? Healthcare firewalls do what?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- Hi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you. Question 6: What are some ways to configure a firewall?arrow_forwardIn reference to network access control, describe some of the access control mechanism used by a network administrator to filter, inspect and detect different forms of traffic. The textbook mentions at least three of them, including firewalls, IDSs, and IPSs. Briefly describe what is the purpose of each and how they operate. What do you think are the advantages and challenges of each of these devices. Make sure to elaborate on your answer.arrow_forwardHi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you. Question: What is a virtual firewall? Explain some of the uses.arrow_forward
- Hi, I need the answer to this question. The name of the book is "Network Security, Firewall, and VPNs e2". Thank you. Question: What should you allow and what should you block when setting up a firewall? Why?arrow_forwardExplain how firewalls safeguard your company. How do hardware and software firewalls compare? What's your company's network security rating? Can I circumvent site filtering?arrow_forwardDiscuss how firewalls may help your company's security. What are the benefits and drawbacks of both software and hardware firewalls? What software do you use to evaluate the security of your company's computer network? What are the most effective ways to get around web filtering software?arrow_forward
- cybersecurity course question The liber8tion group has recently started a new malicious cloud service, can you get access to it?Note: Your scope is limited to HTTPS web page: https://9b766570c8933592180288521cdbc015-hyperdash.web.cityinthe.cloud/ What is the code used to get beta access? What is the flag?arrow_forwardHi, I need to answer this question. The name of the book is "Network Security, Firewalls, and VPNs 2nd Edition". Thank you. Question: What is a TOR application and its functions?arrow_forwardHello, I need to answer this question. Wich is the book name: "Network Security, Firewalls, and VPNS 2e". Thank you. Question: Describe the motivation of hackers and other malicious computer network intruders. Can knowing a hacker's motivation help to protect against the hacker's actions? Why or why not?arrow_forward
- Topic: Remote code execution vulnerability in HSMX internet gateway IN YOUR OWN WORDS, please provide detailed Background information about the case and its history I have already read what is already written up. I am looking for an answer from a different point of view/perspective. Do not copy from another source or I will report the answer and the person who answered.arrow_forwardDefend the value of firewalls in preventing cyber attacks on your company. I was wondering if someone could explain the pros and cons of firewall protection, both physical and virtual. How do you assess the safety of your company's network, and what program do you use to do so? How do you recommend evading web filters?arrow_forwardQuestion M .A firewall allows the organization to: enforce a security policy on data exchanged between its network and the Internet. create access rules for a network. check the accuracy of all transactions between its network and the Internet. create an enterprise system on the Internet. check the content of all incoming and outgoing e-mail messages. Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning