Tuesday, May 7, 2019
Firewall Technology (Network Security) Research Paper
Firewall Technology (Network Security) - Research Paper utilizationSecurity requirements have substantially changed recently. Traditionally, securing a scheme was provided by preventing admission fee (physical and ethically) to the see to it system. However, with the introduction of figurer technology, there was a need to develop automated auspices appliances for nurseing the meshing and data of an organization. receivable to vast rise in threats, vulnerabilities, hacking and cyber crimes, firewalls become mandatory as the first choice to implement for securing the network and data for either computer network. Firewalls Computer Security is the general term for a set of resources knowing to help protect data and ruin the efforts of hackers. More over, it is a set of measures to protect data during transmission over a set of interconnected computer systems. Hence, security measure measure is a set measures for deterrence, prevention, detection and correction of security th reats that can damage or divulge information either locally or when transmitted. Hence, certain security mechanisms that be designed to detect, prevent and restore security after an attack. Consequently, many network appliances are invented to secure a network. The most popular network security appliance that is habituated in almost every small or corporate network to provide security is a firewall. Firewall is defined as a combination of hardware, software, and procedures that controls access to an intranet. Firewalls help to control the information that passes between an intranet and the Internet. A firewall can be round-eyed or complex, depending on how an organization decides to control its Internet traffic. It may, for example, be established to limit Internet access to e-mail only, so that no other types of information can pass between the intranet and the Internet (Firewall.2007). Firewalls are network security devices that are categorized in hardware-based firewalls and s oftware-based firewalls. The hardware-based firewalls are more secure, as they are not dependent on the operating system. On the other hand, software-based firewalls are dependent on the operating system that may demonstrate risks. The choice from these options depends on the cost as well. However, a full features firewall may protect the computer network from hackers or cyber criminals. It will detect, block and quarantine viruses and malicious codes that tries to enter in the network. Moreover, constellation on the local area network demonstrates a graphical user interface to ensure that each preventive measure is active and running (Agnitum outpost persona firewall pro 2.0.2004). Benefits Constant monitoring of security is achievable via a firewall implementation. As all modifications and logs are stored in a firewall, that are divergent of dissemination on hosts on the network. Firewall also provides the protocol-filtering capability as it filters protocols and services associ ated with them in order to secure them from exploitation. Moreover, firewall hides inward communication of the network from the outbound network that is also called a wide area network (ADVANTAGES OF FIREWALL). Furthermore, the use of computer networks and communication lines require protecting data during transmission. In addition, firewalls also provide centralized oversight for the network. This is an ultimate advantage for the network security staff within an organization as the management and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.