Академический Документы
Профессиональный Документы
Культура Документы
XTUML
DEVELOPED BY:
NAME:
STUDENT NUMBER:
OLEBILE DITSHWEU
S103012902797
REGISTRATION:
S103012902984
COORDINATOR: MS BAME
OBJECTIVES
Define XTUML
Discuss the use of XTUML
List and explain different components of XTUML
Outline characteristics of XTUML
Identify benefits of XTUML
SYNOPSIS
The idea behind this project is to investigate about Executable and Translatable UML
(XTUML) with much focus on the components of XTUML further extending to benefits that
are being provided by XTUML. The report will cover up characteristics of XTUML and how
XTUML is applied in day to day business across programming platforms in different
organisations.
1.0 INTRODUCTION
The project on Executable and Translatable UML introduces the readers and mostly those
who are interested much in programming to an understanding of XTUML theoretically
without excluding the practical aspect behind. Focus has been turned much on uses of
XTUML, components of XTUML and characteristic of XTUML. The author has extended
the report by further explaining the benefits behind XTUML usage. Different readers who are
going to use this report at any point have been considered therefore the author opted to use
the simplest language understood by all. The project has been subdivided into different topics
for clear understanding with flow of topics.
Personal Firewalls- This type of firewall has been developed to guard a single
internet connected host from unauthorised access. Personal or desktop firewall as it is
commonly known operate in the background at the link layer in protecting the
integrity of the system from intruders by controlling internet connection coming in
and going out from a node. This firewall can even go into an extent of alerting the
administrator about the attempted intrusion. (Hilal 2012)
Network Firewalls- protects computer network of either an organisation or a
company from intruders, this firewall can be categorised as software firewall and also
hardware firewall or even an integration of both categories. Network firewall can be
used to limit outsiders from accessing the internal network. (Avolio (2001)
Packet Filtering Firewalls this type of firewall is being used to analyse network
traffic at the transport layer by monitoring each packet coming in and going out of the
companys network by either allowing or rejecting the packet depending on the
defined rules. (Avolio 2001)
Stateful Inspection Firewalls this firewalls keeps tracks of the connection status
depending on either the connection is in an initiation, data transfer, or a termination
state. Stateful firewall operates at the network, transport and session layers. (Hilal
2012)
Circuit Gateway Firewalls- are firewalls that functions at the session layer of the
OSI model by sustaining connections between two hosts that are sanctioned to be
secure. This firewall assumes that two hosts that have been authenticated trust each
other and can be permitted to communicate without having to monitor the kind of
communication between two hosts. According to Avolio (2001), Circuit Gateway
Firewalls protects the internal and external networks by making sure that there is
restriction of TCP/IP kernel handshaking activities.
4. 1Firewall Strength
Firewalls allow the implementation of audits and alarms that provides the ability to
monitor security related events.
Firewalls provide a single block point that prevents unauthorised users away from
protected network
Firewalls can be used in implementing Virtual Private Network by the use of the
tunnel mode capabilities
Firewalls encapsulate security as administrators can be able to control and manage
multiple firewalls in a centralized location avoiding a situation the access control list
has to be maintained on a number of separate internal servers which are not using the
same systems of operation. The ability of the firewall to be administered centrally
allows administrators to be able to view the network and also deny or allow required
services efficiently in a faster way.
The above strength of firewalls has been denoted by Shinder (2008).
Firewall and VPNs can be used both to strength the security of network resource and data
packets transmission from the internal network to public network and also from public
network to internal network due to their different functions. (Avolio 2001)
8
Following are few differences that have been identified between Firewalls and VPNs;
Firewall prevents connections to the network ports of your workstation that a
malicious program may try to connect to in order steal information, to infect
computers connected to the network and also mess up with the entire internal network
while VPNs encrypts data that is transmitted over internal network connection from
the internet, VPN also ensure that an IP address is hidden from hackers or intruders.
Firewalls have been designed in such a way that they are positioned in a strategic
location on the network to block certain types of traffic whereas VPNs open secure
channels of communications and VPNs communicate through firewall. (Avolio 2001)
6.0 CONCLUSION
Despite the growth of Information Technology in different areas such as security of networks
and software and many expertise in software development and security analysis, many
products that strengths the security of large companies and personal internal networks from
the outside world have been developed to defend systems against hackers. In spite of this,
firewalls still play a major role in protecting both personal network and internal network of
large companies as there has been protocol enforcement, activity logging, IPS capabilities as
9
7.0 REFERENCES
Avolio, F. (2001), Firewalls, VPNs, and Remote Offices: [Online]. Available from:
http://www.avolio.com/columns/fwvpns+remote.html (Accessed 25/01/2014)
Ferguson, B. (2005), Network +Fast Pass. USA: Sybex, Pty (Ltd).
Glynn, F. (2013), Firewall Security (The History of Firewall Security): [Online]. Available
from: http://www.veracode.com/security/firewall-security (Accessed 25/01/2014)
10
11