StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Commercially Available Firewalls - Essay Example

Cite this document
Summary
 In the paper “Commercially Available Firewalls” the author analyzes the activity of NBK, a banking institution, that faces the risk of having sensitive customer data stored in its computer database accessed and stolen by hackers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Commercially Available Firewalls
Read Text Preview

Extract of sample "Commercially Available Firewalls"

Commercially available Firewalls Grade (27th, Jan. Commercially available Firewalls NBK is a banking institution that faces the risk of having sensitive customer data stored in its computer database accessed and stolen by hackers, who may in turn use the same information to defraud the bank’s customers off their money. Losing such sensitive data could cause a big problem to the bank and its customers. Considering that there is a continuous flow of such sensitive information on the bank’s networks, through the transfer of customer data from the branches country wide to the head office, and among the bank branches, the protection of such data is inevitable.

Application-Layer Firewall, is the type of firewall that can address the vulnerabilities faced by NBK bank, since once the Application-Layer Firewall is installed, it will safeguard the bank’s data, since this type of firewall prevent all unwanted outside traffic from reaching protected machines (Venkatesulu & Kumar, 2012). This type of firewall works towards monitoring all browser traffic, or all telnet traffic, and intercepts or blocks the packets that do not match the set data traffic rules, since they are considered to be intrusive (Venkatesulu & Kumar, 2012).

To enhance the effective operation of the firewall once it is installed, fellow workers are supposed to understand that firewall does not protect the computers from all sort of harm, and thus should observe the following set of procedures: No use of external drives, CDs and DVDs, since Malware can be delivered to the computers through them. Avoid the use of any unauthorized connections such as Modems or wireless connection, since firewall does not protect against traffic or software that does not come through it (Venkatesulu & Kumar, 2012).

Reference Venkatesulu, D. & Kumar, N. (2012). Firewall: Testing of various commercially available firewalls in new operating systems. International Journal of Computer Science and Technology, 3 (1), 798-801.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Commercially Available Firewalls Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Commercially Available Firewalls Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/business/1616287-writers-choice-please-read-and-follow-the-instructions-precisely-as-the-instructor-is-a-pain-on-the-neck
(Commercially Available Firewalls Essay Example | Topics and Well Written Essays - 250 Words)
Commercially Available Firewalls Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/business/1616287-writers-choice-please-read-and-follow-the-instructions-precisely-as-the-instructor-is-a-pain-on-the-neck.
“Commercially Available Firewalls Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/business/1616287-writers-choice-please-read-and-follow-the-instructions-precisely-as-the-instructor-is-a-pain-on-the-neck.
  • Cited: 0 times

CHECK THESE SAMPLES OF Commercially Available Firewalls

Illegal use of VOIP

The traditional telephone available with the customer could be used for the purpose with a VoIP adapter.... The traditional telephone available with the customer could be used for the purpose with a VoIP adapter.... Voice over Internet Protocol or VoIP enables a person to make telephone calls using broadband internet instead of the usual telephone line....
6 Pages (1500 words) Essay

Talisker Insurance Agency

nbsp;As part of immediate modernization, we have to purchase 13 PCs with latest available configuration.... The paper “Talisker Insurance Agency” analyses the issue when Mr.... Smith has made a practical decision of consolidating the two work premises into one.... The Agency will have to undergo major revamping of information flow and computing environment....
16 Pages (4000 words) Essay

Identity Theft and Retail Shopping

Identity theft and related offenses such as credit card fraud, spamming, phishing, hacking and viruses are problems that affects everyone who uses a computer or relies on an organization that does so.... Because more people are becoming dependent on computers in their day to day… tivities and virtually all businesses in the modern world must resort to computers as a means of remaining competitive in today's marketplace, all forms of internet crime should be a concern for everyone....
11 Pages (2750 words) Research Paper

Network/System Forensics

Cyber attack can be referred to as the computer to computer attacks that are carried out to erase, alter, or steal information or to impede or destroy the functioning of the targeted computer system.... hellip; It is imperative to note that cyber attack can be relatively harmless and fail to cause any form of harm to the systems or the equipments....
10 Pages (2500 words) Research Paper

Development of Smart Card Application

These facilities are not readily available to third party application developers making the development of these applications exclusive to a few highly skilled developers who have specialized in a particular smart card hardware and software.... Business has seen a paradigm shift from the traditional face-to-face transactions to on-line transactions where services can be accessed… The high connectivity that makes the world a global village has resulted in spontaneous emergence of electronic businesses which have opened up new avenues of commerce and access to a wider market....
10 Pages (2500 words) Essay

Ethical Hacking

This assignment "Ethical Hacking" focuses on Legal Issues in the existing system of processing and storing information, additional considerations with respect to centralization and how the vulnerability profile for the organization might change under the centralization.... nbsp;… This assignment also discusses classification of penetration tests, legal implications after obtaining access to the private information, strategies for Mrs....
8 Pages (2000 words) Assignment

Inbuilt Linux and Windows Firewall

Linux is a widely available operating system that is accessible, and open source with many users.... This paper ''Inbuilt Linux and Windows Firewall '' tells that Windows and Linux are two of the most commonly used operating systems in the world.... The most significant difference between these operating systems is its open-source nature....
5 Pages (1250 words) Essay

Malware Analysis Plan

This paper ''Malware Analysis Plan'' looks into the possible methods, techniques, skills, and knowledge through which the malware are handled and computing experiences are made safe.... The malware is a designated computer program in its own created for the sole purpose of negatively impacting the program, network, system, firewall, or other security encrypted sources....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us