Firewall and Internet security - Dissertation Example

Comments (0) Cite this document
The advancements in technology have almost pulled every individual on earth into the virtual world of cyber pace.As every day passes by, the rapidity with which internet grows has increased exponentially and the world is shrinking smaller and smaller…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Firewall and Internet security
Read TextPreview

Extract of sample "Firewall and Internet security"

Download file to see previous pages The advancements in technology have almost pulled every individual on earth into the virtual world of cyber pace.As every day passes by, the rapidity with which internet grows has increased exponentially and the world is shrinking smaller and smaller. People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each other. The distance is no more a matter of concern. Despite all the advantages of a networked world, the parallel increase in cyber threats has been an alarming factor. Information is the key to success of any individual or organization. When there is a threat to the security of such an important factor and the manner in which networked computers are hacked within seconds of time has put cyber security as one of the top priorities for technology developers. With the advent of these issues, the installation of firewalls has become a mandatory activity for every internet user. Every time a new level of security is proposed, a new mode of threat is ‘unearthed’ in this virtual world. So, as a precautionary measure, people protect themselves with having both personal as well as network firewalls. Although many kinds of research has been done on the levels of protection offered by network firewalls and personal firewalls, not much has been done on the perspective of providing a comparison between these two types of firewalls. (CHESWICK et. al, 2003) Continuing on these lines, the primary aim of this research is to examine the current literature comprehensively and produce a compare and contrast analysis of these two types of firewalls in regard to the increase in today's internet security. However, since the category of this itself provides a large scope for a complex and more time consuming analysis, the research question is further refined such that it focuses mainly on the following topic - why implementation of personal firewalls in every system in an enterprise is considered to be a difficulty when compared to the implementation of network firewalls. The reason that could be given for the choice of this topic is that irrespective of the number of advancements in firewall technologies, no proper solutions have been found yet, to understand the continued ignorance of affording personal firewalls to every system user in an enterprise instead of network firewalls, which are always considered as the preferred option. (Firewalls, 2003) Objectives of the research Based on the above research questions, the primary objectives of the research can be derived. The most common differences between personal and network firewalls (which are explained in the literature review section) are the architecture and design features, the working environment, technical features and other advantages and disadvantages of each type of firewall. Implementing a personal firewall seems to be a tougher task, as the configuration might not be similar for every system. This makes the process of implementation a difficult task. Each time a firewall is implemented; the system components and modules pose certain restrictions that in turn make the process tedious. The situation is entirely different in a network environment. Since the implementation is done on the network as a whole, the task of installing them in individual system is eradicated. In a network environment, the firewall controls the communication and network traffic. As the functions of a network firewall are composed of easier installation management process, it strikes a greater difference from that of a personal firewall. The disadvantage of a personal firewall strengthens the research question, as it indicates the importance of network firewalls. Hence, the analysis of the areas which were described above is considered to be the primary objectives of the research. Literature Review The progress of internet and development of technology has necessitated the need for ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Firewall and Internet security Dissertation Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from
(Firewall and Internet Security Dissertation Example | Topics and Well Written Essays - 2250 Words)
“Firewall and Internet Security Dissertation Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Firewall and Internet security

Internet Security

..., the recipient and transmission. The previous threats and preventative measures discussed were user specific, which means that they were concerned with information that a user himself wishes to transmit or receive. However the most general form of internet security is through firewalls, which directly restricts or controls communication between networks on the internet, at all time (Cheswick, 2003). These are of various sorts and securities, with each allowing varying privileges, depending upon the nature of security and allowance required. How firewalls work is that once set up, all information entering or leaving a...
7 Pages(1750 words)Research Paper

Firewall Technology (Network Security)

...measures for deterrence, prevention, detection and correction of security threats that can damage or divulge information either locally or when transmitted. Hence, certain security mechanisms that are designed to detect, prevent and restore security after an attack. Consequently, many network appliances are invented to secure a network. The most popular network security appliance that is used in almost every small or corporate network to provide security is a firewall. Firewall is defined as “a combination of hardware, software, and procedures that controls access to an intranet....
6 Pages(1500 words)Research Paper

Internet Firewall Security

.... This paper will shed light upon internet firewall security and how a good firewall can protect a person from malware, Trojan horses and other undesirable viruses. Firewall Basics: “The term "fire wall" originally meant, and still means, a fireproof wall intended to prevent the spread of fire from one room or area of a building to another. The Internet is a volatile and unsafe environment when viewed from a computer-security perspective, therefore "firewall" is an excellent metaphor for network security.” (What is a firewall?) Firewall is not something...
8 Pages(2000 words)Term Paper

Internet Security

...not discourse whitest the administration of the whole decorum, which administers the way packets are handled during this process and the clouds of administering encoding the protocols. The security etiquettes shield the packets from interfering though they do not protect the hosts, which are mandated to exchange different kinds of traffic. These policies are quite complex in the different configurations, which are used on the internet layer protocol, which are used to build firewalls and simulated, sequestered networks. The main problem that comes along with the industrial policy and the mechanisms for the network security is the difference between the articulacy and the...
5 Pages(1250 words)Essay

E-Payment Systems Assignemnt

...has become a matter of concern for all the organizations. The hackers allegedly steal information of the company and their customers by flouting the database security. Therefore it becomes necessity for the companies to strengthen the security of the database in order to safeguard their private information’s. The following are the recommended techniques by which the database can be secured from foreign attacks. The company must install anti-spam and other scanning software to protect the database from hackers. The administrator password for database access must be regularly changed. The database must be strongly fire walled. Specialized firewall and...
5 Pages(1250 words)Assignment

Internet Security

...DELIVERING INTERNET SUCCESS TO SMALL BUSINESSES: NETWORK SECURITY FREE ONLINE TRAINING Literature Review Background of the Review With the emergence of information technology's embrace over the different indicative resolutions provided to modern business industries, it could not be denied that the saturation of resources for this particular approach to business have been better dealt with through online support as well. There are some instances when finding on-ground support is not easy enough to obtain especially for those owning small businesses online. Likely, seeking the help of professional individuals in the field of information technology does cost something, and practically, this amount is not...
7 Pages(1750 words)Essay

Internet security systems. Designers should aim at producing strategies that will effectively put under control the Internet use. Such measures can include invention of effective Internet monitoring tools, increased use of security analysis tools as well as an increased use of hard-to-crack passwords and firewalls (Flynn, 2001). It is a fact that Internet is a world wide connection of networks makes it accessible to users regardless of national, regional and geographical boundaries (Flynn, 2001). Therefore this increasing freedom to access information and data has presented the greatest headache to lawmakers, governments, and regulatory bodies. It is clear...
8 Pages(2000 words)Essay

Firewall Security Measures

...the internal network will enable the VNP to protect it with its firewall and other security features and connect it to other networks in the internet. 2d ii) Having the IDS in point B will reduce its capabilities in detecting intrusions since the IDS will only detect intrusions in the network which otherwise could be prevented by the firewall and VPN after it. If it is placed in point A the IDS could detect intrusion in internal network signifying a breach in the firewall or VPN. 3a One problem of an FTP application is due to the NAT translation that occurs within firewall, and due to the ports it uses. Some FTP applications are not...
13 Pages(3250 words)Essay

Internet Security

...of the companies or organizations that are working on international basis can get lost. In the lieu of internet security, there are a number of security measures that are taken such as anti-virus software, spyware, firewall and copyright authentication. There are many other security measures taken by various global organizations such as passwords for security purposes. The companies that are working online are at higher stake of lapsing of internet security. The online companies suffer from online monetary frauds that are quite problematic for the organizations. For all these purposes, further measures...
7 Pages(1750 words)Essay

Internet Security

...Internet Security Facebook is a social media platform that is renowned all over the world. In terms of its security, there are aspects that deem a great deal of attention especially since the people all over the world make use of it and hence have to be sure that they are using a website which ensures complete security and data protection. The four aspects of security are regarded as Privacy, Authentication, Integrity and Nonrepudiation. Privacy is related with how Facebook users prevent disclosing their respective information to people who are unwanted and have no say within the related systems. The privacy aspect has been given significance in the wake...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Dissertation on topic Firewall and Internet security for FREE!

Contact Us