Just copy from file( Just change into own words) to new one in own words. Instructions are also given in file (project02) as well. It will give u the idea of how it was done. To sum up,  project is already done just have to change the wording. 

For your final step, synthesize the previous steps and labs to summarize the major findings and from this project.
Specifically, prepare a technical report that summarizes your findings. Include all of the following elements:
1. The strengths and limitations associated with limiting access of web pages through the use of firewalls.
2. A detailed description of how tunneling through firewall via SSH worked and how the process could be used protect a private subnet. Describe the implications of using a jump box for access to the private subnet. Cover concerns such as key storage, creation, and rotation at scale for a large organization.
3. TLS communication challenges and results from your TLS 1.3 Java client-server implementation. Describe how this functionality could be used to support an IoT application with hundreds of thousands of remote sensor devices connecting across a distributed network.
4. A discussion of major threats to WLANs and how each can be mitigated. Provide security monitoring best practices and describe suitable approaches to protecting a WLAN.
Delve further into these topics by conducting research beyond the classroom readings and lab exercises to gain further insight and enhance your report.
Naturally, I expect your report will include a title page, table of contents, list of tables and figures (if applicable), and a list of references. Organize the content into sections, with clear, meaningful headings.
Joint Task Force Transformation Initiative. (2015, January 22). “SC-7 Boundary Protection,” from Security and Privacy Controls for Federal Information Systems and Organizations. Retrieved from https://nvd.nist.gov/800-53/Rev4/control/SC-7

Network and Firewall Protection Final Report  

Firewall Strengths and Limitations  

Firewalls are devices placed within a network to protect data systems from unwanted communication.  They “monitor incoming and outgoing network traffic and decide whether to allow or block specific  traffic based on a defined set of security rules” (Cisco, n.d.). Firewalls, at its most basic form, filter  stateless packets but also provide advanced operability to be used as stateful multi-layer inspection  firewalls, circuit level gateways, application level gateways, next-generation firewalls (NGFW), threat focused NGFW, cloud firewalls and unified threat management (UTM) firewalls.  
Firewalls overall do a great job of limiting access to webpages by opening/closing ports,  restricting/permitting IPs, providing trust/untrusted boundaries and even providing proxy/web caching  services. Limitations arise when ports are misconfigured or rerouted by unauthorized personnel. For  example, an administrator may close port 194 to restrict communication using Internet Relay Chat (IRC),  however users may configure IRC to use port 80 which bypasses established security parameters.  

SSH Firewall Tunneling  
Port 22 has been designated by Internet Assigned Numbers Authority (IANA) to be the default defacto  port for using SSH to access remote systems securely. A SSH server and client runs over this port,  providing an encrypted back hall connection that can be used to transfer data securely. Port forwarding  can also be used by the SSH protocol to bypass closed firewall ports to reroute to another port with an  encrypted tunnel for data transfer to occur.  
In the project with the firewall lab, two EC2 instances were used to simulate a private subnet that  should only be accessible internally. Firewall rules were configured to open ports, and to explicitly allow  access from another internal instance, jump box, that was on a different subnet by specifying the IP  address and ports to be used. Access into the private subnet from the jump box provided a secure  remote connection as long as the credentials for access were properly configured between the  authenticating systems. Tunneling or port forwarding was performed with this process to gain access  over the TCP/IP connection by rerouting to an open port in the firewall. In a small organization,  managing keys properly, to include creation/rotation, would suffice. However, in a large corporation,  manually managing keys is not scalable and could provide challenges which could lead to possible  system compromises.  

IoT vs. TLS  

IoT devices are rapidly increasing, and are integrating within our basic, daily way of living. It is gaining  popularity with home appliances, factories, tools, cars and personal electronic devices. The consumer’s  demand for convenience adds pressure to the release of devices that are developed inherently  unsecure. “IoT devices are vulnerable mostly because they lack the necessary built-i

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.