Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 6, Problem 14RQ
Program Plan Intro

Firewall architecture:

Entire firewall devices are configured in various network architectures. They might be mutually exclusive, but sometimes may not be. It works best for an organization that depends on following factors:

  • Main purposes of the network
  • Company’s capacity to establish the architectures
  • Cost of the utilities.

The common architectural implements of firewall are:

  • Single bastion hosts
  • Screened host architecture
  • Screened subnet architecture

Blurred answer
Students have asked these similar questions
How do screened host architectures for firewalls differ from screened subnet firewall architectures? Which of these offers more security for the information assets that remain on the trusted network? Why?
What are the key responsibilities of a network firewall in the context of the OSI model? In which layer(s) does it operate?
At what two layers of the Open Systems Interconnection (OSI) model does a packet-filtering firewall operate?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,