Principles Of Information Security, Loose-leaf Version
Principles Of Information Security, Loose-leaf Version
6th Edition
ISBN: 9781337685757
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 6, Problem 1E

Explanation of Solution

The three different software firewalls are compared and organized in table format as follows:

Firewall Functionality Cost Features Type of Protection Weighted Rank
McAfee Antivirus $99.99/year Provides anti-theft, wireless network production, data backup, data encryption and database security.

Home and

Business

2
Comodo Firewall Pro It is based on Default Deny Protection (DDP) security.

$39...

Blurred answer
Students have asked these similar questions
Defend the conceptual method that has to be used when creating firewall rule sets.
You've just started working as a Security Analyst for a new company. As a security analyst, you're in charge of overseeing your company's Firewall security rules. Your company's firewall policy was already in place when you started working there, thanks to a prior employee. In order to avoid policy breaches or anomalies, what would be your initial step?
You have been entrusted with the responsibility of developing a security architecture for a large corporation. Make a list of all of the components (hardware and software) that you will need in order to create a secure network. Give a rationale for your selection of a certain component. Draw a diagram to depict a potential architecture, including the location of the component specified in the previous step (a). Include a description of the architecture you've created and the positioning of components in the design.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,