Discuss about cyberattacks and firewalls.

Discuss about cyberattacks and firewalls.

1. Case Project 5-4SQL Injections Attacks

SQL Injection attacks continue to be a significant attack vector for threat actors. Use the Internet to research these attacks. What are some recent attacks that have been initiated by SQL injection? How were they conducted? What defenses are there against them? Write one page report on your research.

2. Case Project 6-4 Network Firewall Comparison

Use the Internet to identify three network firewalls, and create a chart that compares their features. Note if they are rule-based or application-aware, stateless or stateful packet filtering, what additional feature do they include (IDS< content filtering, etc.) their costs, etc. Which would you recommend and why?

Remember to provide a list of online resources used for homework #2.

References

Ciampa, Mark, Chuck. Security + Guide to Network Security (6thed.). Cengage Learning,ISBN: 978-1337288781

word limit:510