Firewall Technology (Network Security) - Research Paper Example

Comments (1) Cite this document
Full Paper Title Name University Network Security In a world where information flows incessantly, companies usually spend a lot of in their endeavor to attain secure computer systems, including servers, firewall and security software, in addition to other areas of computer security such as the physical space and the rules of access…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Firewall Technology (Network Security)
Read TextPreview

Extract of sample "Firewall Technology (Network Security)"

Download file to see previous pages Security requirements have substantially changed recently. Traditionally, securing a system was provided by preventing access (physical and ethically) to the secure system. However, with the introduction of computer technology, there was a need to develop automated security appliances for protecting the network and data of an organization. Due to vast rise in threats, vulnerabilities, hacking and cyber crimes, firewalls become mandatory as the first choice to implement for securing the network and data for every computer network. Firewalls Computer Security is the general term for a set of resources designed to help protect data and ruin the efforts of hackers. Moreover, it is a set of measures to protect data during transmission over a set of interconnected computer systems. Hence, security is a set measures for deterrence, prevention, detection and correction of security threats that can damage or divulge information either locally or when transmitted. Hence, certain security mechanisms that are designed to detect, prevent and restore security after an attack. Consequently, many network appliances are invented to secure a network. The most popular network security appliance that is used in almost every small or corporate network to provide security is a firewall. Firewall is defined as “a combination of hardware, software, and procedures that controls access to an intranet. Firewalls help to control the information that passes between an intranet and the Internet. A firewall can be simple or complex, depending on how an organization decides to control its Internet traffic. It may, for example, be established to limit Internet access to e-mail only, so that no other types of information can pass between the intranet and the Internet” (Firewall.2007). Firewalls are network security devices that are categorized in hardware-based firewalls and software-based firewalls. The hardware-based firewalls are more secure, as they are not dependent on the operating system. On the other hand, software-based firewalls are dependent on the operating system that may demonstrate risks. The choice from these options depends on the cost as well. However, a full features firewall may protect the computer network from hackers or cyber criminals. It will detect, block and quarantine viruses and malicious codes that tries to enter in the network. Moreover, configuration on the local area network demonstrates a graphical user interface to ensure that each preventive measure is active and running (Agnitum outpost persona firewall pro 2.0.2004). Benefits Constant monitoring of security is achievable via a firewall implementation. As all modifications and logs are stored in a firewall, that are divergent of distribution on hosts on the network. Firewall also provides the protocol-filtering capability as it filters protocols and services associated with them in order to secure them from exploitation. Moreover, firewall hides inbound communication of the network from the outbound network that is also called a wide area network (ADVANTAGES OF FIREWALL). Furthermore, the use of computer networks and communication lines require protecting data during transmission. In addition, firewalls also provide centralized management for the network. This is an ultimate advantage for the network security staff within an organization as the management and ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Firewall Technology (Network Security) Research Paper”, n.d.)
Retrieved from
(Firewall Technology (Network Security) Research Paper)
“Firewall Technology (Network Security) Research Paper”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
donnakilback added comment 1 year ago
Student rated this paper as
The topic of "Firewall Technology (Network Security)" was tough to find. I spent ages to find it. Here at StudentShare, I got the best sample. Many thanks!

CHECK THESE SAMPLES OF Firewall Technology (Network Security)

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Firewall and Internet security

...?Firewall and Internet Security – A Research Proposal Research Question The advancements in technology and the growing pace of internet have almost pulled every individual on earth into the virtual world of cyber pace. As every day passes by, the rapidity with which internet grows has increased exponentially and as a result, the world is shrinking smaller and smaller. People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each other. The distance is no more a matter of concern. Despite all the advantages of a networked world, the parallel increase in cyber threats has been an alarming factor....
9 Pages(2250 words)Dissertation

Network Security technologies that can be used to protect a computer network: (NetworkTutorials; Daya; Ray; Turban, Leidner and McLean). Anti viruses Diverse anti viruses programs exist in the marketplace like Symantec, McAfee, Avira, G-Data Panda and Trend Micro that offer solutions to virus programs and these programs are called as antivirus programs. In this scenario, Norton offers a lot of security software. For instance, Norton 360 product is a comprehensive program package which offers antivirus, anti-phishing, anti-spyware email scanning, firewall security, identity security, backup and reinstate and automatic updates...
13 Pages(3250 words)Research Paper

Internet Firewall Security

.... This paper will shed light upon internet firewall security and how a good firewall can protect a person from malware, Trojan horses and other undesirable viruses. Firewall Basics: “The term "fire wall" originally meant, and still means, a fireproof wall intended to prevent the spread of fire from one room or area of a building to another. The Internet is a volatile and unsafe environment when viewed from a computer-security perspective, therefore "firewall" is an excellent metaphor for network security.” (What is a firewall?) Firewall is not something general, it means...
8 Pages(2000 words)Term Paper

The Firewall Security Solution and the Types of a Firewall used to secure a computer system or a server from illegal access. These firewalls can be applied on software applications, hardware devices or a combination of these two systems. In addition, they can be used to protect an institution’s or organization’s computer network (like school, home, and business intranet) beside some malicious access from the outside. This paper has discussed some of the types of a firewall, its working and operational structure. Without a doubt, the application of network firewall ensures enhanced security however there are also a number of issues that make firewall a complex...
9 Pages(2250 words)Research Paper

Network Security

...the device, and also render it unusable by locking all its functional operations. Reference List BlackBerry Overview, viewed 3 April 2013, BlackBerry Supporforums, 2009, Java Development, viewed 3 April 2013 Network-API-alternative-for-legacy-OS/ta-p/614822> Defense Information Systems Agency 2011, Blackberry Technology Overview (For Blackberry Enterprise Server 4.1.X & 5.0.X), Version 1, Release 3. Government of Canada 2002, Personal Digital Assistant Vulnerability Assessment (PDA VA) (ITSPSR-18), IT Security Products/ systems Report, Communications Security Establishment (CSE)....
7 Pages(1750 words)Essay

Network Security

...attacks. Using up-to-date equipment and technology and enforcing a comprehensive security plan, attacks such as those mentioned above can be prevented and denied. (Bhatnagar, 2009). Proper equipment and maintenance are vital to the consistency of the network security. In a continually advanced technological landscape, security measures need to adapt to threats accordingly. Methods such as the use of firewalls and Virtual Private Networks will help keep a network stable and secure. Detailed Network Security Recommendations A...
3 Pages(750 words)Case Study

Firewall Security Measures determine if a certain unit within the network is traceable outside the firewall of the whole network system. This should not allow intruders to know something (i.e. IP address) about any of the unit inside the network nor that packets are roaming around our systems. The firewall should serve as a front-end security in order to provide “invisibility” to all the units within its perimeter. The next idea is to ping each unit in the network system. We may used third party ping application for large scale ping requests like MegaPing. The idea of the ping is to determine if an IP address it active, or to say that a unit...
13 Pages(3250 words)Essay

Network security

...of defense of a house from thieves can help. The network attached storage helps the interconnected PCs from hacking and viruses. In this way the attacks at entry level are prevented when the alerts go through the whole network. The computer host security network is not dependable as the hackers can have access and can purchase the hosts rather more easily. Version Enhancement The net work security checklist includes the authorization and authentication of the user, creation of firewall for filtering the allowed services to the user, provision of the intrusion prevention system, monitoring for suspected traffics,...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Firewall Technology (Network Security) for FREE!

Contact Us