Nobody downloaded yet

Firewall and Internet security - Dissertation Example

Comments (0) Cite this document
Summary
The advancements in technology have almost pulled every individual on earth into the virtual world of cyber pace.As every day passes by, the rapidity with which internet grows has increased exponentially and the world is shrinking smaller and smaller…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Firewall and Internet security
Read TextPreview

Extract of sample
"Firewall and Internet security"

Download file to see previous pages The advancements in technology have almost pulled every individual on earth into the virtual world of cyber pace.As every day passes by, the rapidity with which internet grows has increased exponentially and the world is shrinking smaller and smaller. People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each other. The distance is no more a matter of concern. Despite all the advantages of a networked world, the parallel increase in cyber threats has been an alarming factor. Information is the key to success of any individual or organization. When there is a threat to the security of such an important factor and the manner in which networked computers are hacked within seconds of time has put cyber security as one of the top priorities for technology developers. With the advent of these issues, the installation of firewalls has become a mandatory activity for every internet user. Every time a new level of security is proposed, a new mode of threat is ‘unearthed’ in this virtual world. So, as a precautionary measure, people protect themselves with having both personal as well as network firewalls. Although many kinds of research has been done on the levels of protection offered by network firewalls and personal firewalls, not much has been done on the perspective of providing a comparison between these two types of firewalls. (CHESWICK et. al, 2003) Continuing on these lines, the primary aim of this research is to examine the current literature comprehensively and produce a compare and contrast analysis of these two types of firewalls in regard to the increase in today's internet security. However, since the category of this itself provides a large scope for a complex and more time consuming analysis, the research question is further refined such that it focuses mainly on the following topic - why implementation of personal firewalls in every system in an enterprise is considered to be a difficulty when compared to the implementation of network firewalls. The reason that could be given for the choice of this topic is that irrespective of the number of advancements in firewall technologies, no proper solutions have been found yet, to understand the continued ignorance of affording personal firewalls to every system user in an enterprise instead of network firewalls, which are always considered as the preferred option. (Firewalls, 2003) Objectives of the research Based on the above research questions, the primary objectives of the research can be derived. The most common differences between personal and network firewalls (which are explained in the literature review section) are the architecture and design features, the working environment, technical features and other advantages and disadvantages of each type of firewall. Implementing a personal firewall seems to be a tougher task, as the configuration might not be similar for every system. This makes the process of implementation a difficult task. Each time a firewall is implemented; the system components and modules pose certain restrictions that in turn make the process tedious. The situation is entirely different in a network environment. Since the implementation is done on the network as a whole, the task of installing them in individual system is eradicated. In a network environment, the firewall controls the communication and network traffic. As the functions of a network firewall are composed of easier installation management process, it strikes a greater difference from that of a personal firewall. The disadvantage of a personal firewall strengthens the research question, as it indicates the importance of network firewalls. Hence, the analysis of the areas which were described above is considered to be the primary objectives of the research. Literature Review The progress of internet and development of technology has necessitated the need for ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewall and Internet security Dissertation Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1415685-firewall-and-internet-security
(Firewall and Internet Security Dissertation Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/information-technology/1415685-firewall-and-internet-security.
“Firewall and Internet Security Dissertation Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1415685-firewall-and-internet-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
SECURITY ISSUES IN RED HAT ENTERPRISE LINUX
From this research it is clear that the safety protection of Linux cannot leave without all kinds of security principles and tools. SELinux System use the mandatory access control based on the rules which are set by the administrator, restricting the process to the least privilege and control the file access, resolving some authentication issues.
68 Pages(17000 words)Dissertation
Internet Marketing
The target market for the product, Mercury shoes, would be the younger set, and Facebook reaches this audience on a wide basis. Another way of marketing the product would be through blogs by both having established bloggers blog about the product on their site, and by hiring athletes to write a blog that mentions the shoes.
28 Pages(7000 words)Dissertation
Information Security analysis
The paper presents the frequency and percentage distribution of the organizations considered in the study and grouped according to nature: public sector or government agency, private sector or business, and nonprofit organization. The paper also presents the frequency and percentage distribution of the organizations included in the study grouped according to the sector each organization represents.
87 Pages(21750 words)Dissertation
Development of an internet based housing demand database system for the KwaZulu-Natal Department of Human Settlements
The focus of research is on helping the KwaZulu Natal Department of Human Settlements recognize the potential benefits and features of the proposed enhancements to the housing information system. The use of IT application and IT governance principles in the public sector too has yielded positive results in the past few decades.
22 Pages(5500 words)Dissertation
Network security
The student should read and sign the declaration. Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: Network Security and Its Business Impact in Educational institutions Student Declaration I declare that 1. I understand what plagiarism is; 2.
50 Pages(12500 words)Dissertation
Service and the Security implication of VOIP
The growing popularity of VoIP in the business industry has been growing exponentially in the last 5 years however little is communicated to businesses on the extent of the security exposure these companies are facing. The use of technology, the internet in particular, in transmitting useful information increases the incentive for nefarious individuals to take advantage of technology for gain.
52 Pages(13000 words)Dissertation
Internet Firewall Security
Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis.
8 Pages(2000 words)Term Paper
Cyber Network Security, Threats, Risk and Its Prevention
To this, the role of information technology (IT) is worth mentioning that is greatly depended upon. Although IT may not be the only technological advancement responsible for the improvement in lives and activities, yet it has a significant role to play since changes in lives would not have been possible without the availability of new information (Castells, 1999, p.2).
32 Pages(8000 words)Dissertation
Telephony Application and VoIP (voice over Internet Protocol
Since the inception of VoIP, it is possible to transfer voice, fax and video information for long distances over the internet. Given the new service applications available from VoIP and the expanding capacity for international commerce, operators using traditional public switched telephone networks are switching to internet protocol centric networks to remain competitive.
21 Pages(5250 words)Dissertation
The Value of the Internet for Terrorists - ALQAEDA
According to the report the unparalleled advantages that the advancement of technology, particularly Internet has brought along in terms of global linkage, speed, and convenience of communication, it is no wonder that the terrorist groups too are using Internet as an effective tool organising their entire range of activities.
26 Pages(6500 words)Dissertation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Dissertation on topic Firewall and Internet security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us