U4 Discussion – Coursework Example

Computer Sciences of Part According to Minasi (2006), some of the factors that influence when to enable Firewallinclude the availability of hardware firewall, system type, internet connection, and previous firewall software. Enabling firewall out-rules the need to use WF since it has less set of features that can be updated by a third-party software firewall. Again, enabling FW depends on the type of the computer system; server or client. It is important to enable FW on servers that chiefly host the server end of client-server applications. WF should be employed when designing a single profile of guidelines.
Windows Firewall with Advanced Security (WFAS) is used to develop inbound and outbound guidelines. In addition, WFAS is utilized to design connection security guidelines, authenticated traffic guidelines, specific service considerations among others (George, 2011). WFAS is typically incorporated into Windows Server 2008 Group Policy. In view of the connection state, WFAS entails the three profiles that group rules together; Domain, Private, and Public. The three profiles help to design Firewall policy for computer machines in the specified region of operation. Unlike the basic FW, WFAS enables the user to make guidelines in view of services and port addresses.
Both firewall and enterprise-wide firewall solutions give basic security for all computer systems in a network. For instance, enterprise-wide firewall solutions secure an extensive variety of server computers and client computers. However, enterprise-wide firewall solutions are expensive as compared to firewall. Therefore, it is recommendable to run firewall on each of the Windows Server 2008 systems because it is extremely secure, proficient, and free.
Part 2
Public key encryption utilizes two separate keys at the same time - a blend of a public key and private key. A computer machine utilizes public key, in conjunction with its private key, to decode encrypted information from external computers. For instance, the original data from an external computer is encrypted via the public key into scrambled data. The private key decrypts scrambled data into original data to the destination computer (Magnini, 2005). Notably, the key pairs are designed with prime numbers of length hence making it very secure. The sending PC scrambles information with a symmetric key, then encodes the symmetric key with the public key of receiving computer machine. In this case, the receiving computer device utilizes its private key to disentangle the symmetric key. In the end, the symmetric key is used to unravel the information.
The positive aspect of public key cryptography relies on increased security on computers because an outsider cannot identify the key pairs. Additionally, public key cryptography gives a platform to create digital signatures. One major demerit of utilizing public key cryptography for encryption is the speed factor (Arnaud, 1997). Indeed, there are numerous discrete-key encryption strategies that are inherently faster as compared to current public-key cryptography techniques.
Arnaud, D. (1997). What are the Disadvantages & Advantages of Public-key Cryptography over Secret-key Cryptography? Retrieved from http://denis.arnaud.free.fr/zds/appendix/node8.html
George, A. (2011, April 23). The Basics of WFAS. Retrieved from http://www.windows7library.com/blog/util/windows-firewall-with-advanced-security-wfas-basics/
Magnini, G. (2005, September 26). Introduction to Public-Key Cryptography. Retrieved from https://developer.mozilla.org/en/docs/Introduction_to_Public-Key_Cryptography
Minasi, M. (2006). When & When not to Use Windows Firewall. Retrieved from http://searchenterprisedesktop.techtarget.com/feature/When-to-use-or-not-use-Windows-Firewall