StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Networking and Security: Firewalls - Essay Example

Cite this document
Summary
Firewalls play a vital role in achieving a high scale security. Fundamentally, they are classified as software and hardware firewalls. Firewalls filter inbound or outbound traffic by either allowing or denying it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Networking and Security: Firewalls
Read Text Preview

Extract of sample "Networking and Security: Firewalls"

Networking and Security: Firewalls Security is the core issue of all present and future networks. Firewalls play a vital role in achieving a high scale security. Fundamentally, they are classified as software and hardware firewalls. Firewalls filter inbound or outbound traffic by either allowing or denying it. More often than not a software firewall can manage the major security issues of a home user. Because traffic is limited software firewall can perform well with a computer of good specifications; however in a medium size organization or an enterprise these dimensions are quite different and require specialized hardware firewall.

High volumes of data per second can choke the network if the firewall hardware requirements are not rationally analyzed. A Check Point ® software firewall and two hardware firewalls Astaro ® and Fortigate ® are analyzed for enterprise networks security requirements.A software firewall is specific to Operating System and user requirements. Microsoft and some other Operating Systems provide a built-in firewall, however third-party software firewall solutions are also available to support various user requirements.

Check Point has introduced several models with few client and business specific differences. These are OS Specific firewalls and can only support software mentioned by the each model, most of these supports Nortel Versions: 7.x, 8.x, 9.x, 10.x, 11.x, 12.x, 13, 14 and Cisco OS Versions: 9.x, 10.x, 11.x, 12.x. Various software firewall prices may range from $1,500 – 22,000. (Checkpoint, “Software Container”)A more scientific and analytical approach is required to make decisions for firewall in Enterprise networks.

Enterprises require a full scale firewall security solution because neither the connectivity nor the security can be compromised and the firewall is required to support features like real-time logs and high availability. Astaro ® and Fortigate ® are being used in many enterprises and provide full scale security to networks and applications. These firewalls can ensure network security in complex and dynamic network environment. Role and capabilities of hardware firewalls in an enterprise pays its cost back efficiently, however the product cost may vary depending upon the training, licensing and number of users supported.

Therefore the selection of firewall depends on domain specific requirements and expense varies accordingly for these solutions. Hardware firewalls usually support more than one operating system if not all of them. Firewall licenses are usually subscribed on yearly basis for a specific number of users and gateways.Works Cited Web PublicationsCheck Point. “Firewall-Container”. Checkpoint.com, 2010. Web. 17 November, 2010. Astaro. “Solutions”. Astaro.com, 2010. Web. 17 November, 2010.

Firewalls. “Firewall Types”. Focus.com, 2010. Web. 17 November, 2010.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking and Security: Firewalls Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Networking and Security: Firewalls Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/miscellaneous/1572890-networking-and-security-firewalls
(Networking and Security: Firewalls Essay Example | Topics and Well Written Essays - 250 Words)
Networking and Security: Firewalls Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/miscellaneous/1572890-networking-and-security-firewalls.
“Networking and Security: Firewalls Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/miscellaneous/1572890-networking-and-security-firewalls.
  • Cited: 0 times

CHECK THESE SAMPLES OF Networking and Security: Firewalls

Increasing Security with Limited User Accounts and Restricted Groups

The extent to which we decide to implement security precautions will depend upon how sensitive our data is, how large our network is, and how susceptible it is to attack.... The paper describes the proper use of controls minimizes threats to data, software and hardware.... hellip; As the DULL Company is having 8 PCs with Windows XP Operating System, they would act as a client or workstations....
9 Pages (2250 words) Research Paper

The Software in C++ and Networking

Sometimes it may occur accidentally through programming error but nowadays buffer overflow is an increasingly common type of security attack.... This essay "networking" is about software in C++, it should be kept in mind that which kind of data storage technology is going to be used so that it would be easier to restrict an employee to only view his own profile and edit whatever is allowed....
14 Pages (3500 words) Essay

Power point presentation about Firewall Technologies

This is referred to as packet filter firewalls which lays down the foundation of a technology that will further be improved and developed.... The wide popularity and usage of the internet technology in a global scale necessitates the creation of a system which ensures security within a network.... In addition, Cheswick and Bellovin specifies certain processes which characterizes a firewall which include: "all traffic from inside to outside, and vice-versa, must past through it; only authorized traffic, as defined by the local security policy, is allowed to pass through it; and the firewall itself is immune to penetration" (Abie 2000)....
5 Pages (1250 words) Essay

Firewalls Network Security Analysis

The essay "firewalls Network Security Analysis" discusses the implementation of firewall technology for the enhanced security of any business or personal network.... Nevertheless, some experts believe that firewalls are an effective solution to deal with these issues.... It also outlines and analyzes firewall's security matters, effectiveness, and methodologies in addition to implemented in individual and organizations.... he terms security and privacy are associated with data and information, which are an important part of organizations as well as individuals....
6 Pages (1500 words) Essay

How does a hardware firewall work

This paper will also outline the role of firewalls in the security matters.... At the present, increasing numbers of organizations are exposing their personal networks to internet traffic; therefore, the implementation of firewalls has turned out to be a basic requirement.... In addition, firewalls can be either software or hardware.... “Hardware firewalls are external devices that perform job of a guard between organization's network (office or home) and external networks (the internet)” (Antivirus-Firewall-Spyware)....
5 Pages (1250 words) Term Paper

Honeypots and Firewalls

A dual homed host can be deployed Honeypots and firewalls Honeypots and firewalls Multiple screen subnet architecture vs.... Honeypots and FirewallsThere are diverging characteristics associated with firewalls and honeypots.... firewalls can be deployed in small or medium sized organizations.... Building Internet firewalls.... According to Zwicky, Cooper and Chapman (2000), a firewall is characterized by diverse security ranks on the basis of the position and situation of the computer, security or safeguarding of wireless grids and systems such as Wi-Fi....
2 Pages (500 words) Assignment

The Security of Networking

Information center operators, network administrators, and other information The article covers the basics of protected networking systems, including firewalls, network topology, and safety protocols.... The paper "The security of Networking" states as the complexity of safety threats increases, so do the security mechanisms necessary to safeguard networks.... Information center operators, network administrators, need to appreciate the fundamentals of security to arrange safe and administer systems....
12 Pages (3000 words) Essay

Wireless Security Policy

It has been quite apparent in this regard proper and relevant applicability of this particular policy plays a crucial role to attract the customers to carry out transactions enormously with such companies that ensure greater trust and security (CSIT, 2008).... The paper "Wireless security Policy" discusses that the notion of wireless security policy is principally viewed to be the basis of an organizations' information security....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us