Essay Example on Secure Data Sharing: Packet Filtering Strategies

Paper Type:  Essay
Pages:  2
Wordcount:  494 Words
Date:  2023-04-18

Introduction

1. Operating systems- possess instinctive efficiencies that do packet filtering at the serval software

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

2. Routers - popular because of their simple packet filtering capabilities.

3. Firewall appliances - receives software and hardware mechanisms in a single package.

4. Personal firewalls - help a lot in packet filtering since they use methods that are not complicated.

Strategy Recommendation on Data- sharing

To ensure secure data sharing through file transfer protocol secure (FTPS), I would do it by setting up a virtual private network (VPN) by either using public wires, usually the internet between the two organizations. The aim will be to ensure that the data being shared is safe by providing that the connection between the two organizations is encrypted end to end. It is worth noting that VPN will make use of tunneling protocol to encrypt data during sending and decrypt it at the receiving end, thus ensuring that the data is protected and no easy access. However, I would ensure there are remote-access VPN capabilities through transport layer security (TSL/SSL). It means that that the other organization will be able to access the data remotely while it is still secured. The tunnel points will be authenticated before the safe VPN tunnels are established either by the use of passwords or two-factor authentications. I would ensure that I incorporate both VPN and SSL since it is the most reliable communication for all sorts of device traffic in all private and public networks. The interchange between the web browser and SSL VPN would be encrypted with the SSL protocol and end up solving the obstructions found. Additionally, this strategy will lower cost, increase quality, and work efficiency.

Firewall- specific Strategy to Increase Security Profile

To strengthen the security profile of the institution about the simple mail transfer protocol (SMPT), I would consider using an application-level firewall. It would evaluate network packets for sufficient data at the layer of application before consenting a connection. The main motive for selecting this type of firewall is because it uses a sequence of configured policies to decide whether to block or allow communications. By using the application firewall, it will possibly block the input, output, and system calls that are a bit able to meet the configured policy of the firewall. Additionally, the application-level firewall is known to be the most secure firewall because it uses one application-level, such as the kernel, whereby the process forwards every session each internal user makes on the public network.

Another reason I would go for the application-level firewall is that it can provide secure logging of in and out traffic. By doing this, the firewall can easily detect fake logins and immediately cause failed break-ins such that the hacker is unable to login. It will immediately notify the user of the attempted logging and will take necessary measures. Additionally, the application is the same as packet filtering such that it has a filtering channel and thus able to detect and block any vulnerabilities.

Cite this page

Essay Example on Secure Data Sharing: Packet Filtering Strategies. (2023, Apr 18). Retrieved from https://proessays.net/essays/essay-example-on-esecure-data-sharing-packet-filtering-strategies

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism