StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Firewall Architectures and Techniques A study on the high speed network security they provide - Essay Example

Cite this document
Summary
With the fast development of Internet and enterprise networks, security becomes an important concern to companies all over the world. There are variety of tools and techniques to break the security of the intranet network, so it becomes more and more difficult to protect the network of an enterprise that is the mission of network firewall.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Firewall Architectures and Techniques A study on the high speed network security they provide
Read Text Preview

Extract of sample "Firewall Architectures and Techniques A study on the high speed network security they provide"

Firewall Architectures and Techniques: A study on the high-speed network security they provide INTRODUCTION 1 Introduction to the problem being tackled, and the rationale behind choosing the problem With the fast development of Internet and enterprise networks, security becomes an important concern to companies all over the world. There are variety of tools and techniques to break the security of the intranet network, so it becomes more and more difficult to protect the network of an enterprise that is the mission of network firewall. 1.2 Introduction to the project The project is intended to describe and evaluate firewall architectures and techniques and network security they provide.

The firewall is the central issue of the network security policy of the enterprise that defines procedures to protect the network and its contents and users from loss and damage.Different firewall architectures and techniques provide different correlation of performance vs. security. When considering alternative firewall technologies, a common question is "what are the trade-offs between performance and security" (Cisco Systems, 2002) To answer to this question, various firewall architectures should be regarded and analysed.1.3 Introduction to the envisaged artefact Various aspects of network security are explored, such as security policy, bastion host, packet filter, proxy server, network address and architecture.

(Technology Investigation Center, 2002) There are four main generations of firewall architectures: packet filters, circuit level firewalls, application layer firewalls and dynamic packet filters. Also a number of firewall products exist from various producers.2. REVIEW OF PROGRESS 2.1 Statement on the appropriateness of the current objectives for the project A variety of network threats exist, such as network packet sniffers, IP spoofing, password attacks, denial-of-service attacks or application layer attacks.

Therefore network administrators are working hard to protect their networks using various tools that help them to test and improve network security. Firewall takes the central place among such tools restricting access between a protected (internal) network and the Internet or other networks.2.2 Description of the strategy being used to pursue the project There are 3 global stages of the project: research, analysis and writing recommendations. Typical project plan for firewall architectures and techniques includes:List of services delivered over the Internet to state agencies List of desirable firewall features List of firewall products and their ability to be configured to provide desired features Process documentation, test procedures, results and analysis Glossary of terms and acronyms Index of Reference Materials Web accessible repository of information suitable for the public Communication of results to interested parties Identification of needs for further investigation of firewalls or related issues (Technology Investigation Center, 2002) 2.

3 Summary of the progress so far After beginning of the project research process is conducted. Results analysis is done then and recommendations are given.It is assumed, that research process takes about 2 months, analysis takes another 2 months and 1 more month is needed to produce recommendations.2.4 List of the difficulties encountered and how these were tackled/overcome One of the most important problems using firewall is its ability to resist network attacks. Another valuable issue is firewall performance, or speed of network traffic filtering.

Modern commercial firewalls provide 2.5 Description of how the project is being supervised by the supervisor, and any changes preferred by the student. The project has three main parts: research, analysis and writing recommendations. It is assumed that student provide supervisor each part of the project with brief report about the work done.References"Evolution of the Firewall Industry". Cisco Systems, Inc. 28 Sept. 2002. 8 Dec. 2005 "Firewalls". Technology Investigation Center. 13 Feb. 2002. 8 Dec. 2005 "Firewalls".

SecurityTechNet.com. n.d. 8 Dec. 2005 Northcutt, Stephen, Zeltser, Lenny, Winters, Scott, Fredrick, Karen and Ritchey, Ronald W. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems New York: Sams Publishing, 2002Tett, Mark. "The best firewall is ..". Technology & Business magazine, ZDNet. 8 Aug. 2005. 8 Dec. 2005

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewall Architectures and Techniques A study on the high speed Essay”, n.d.)
Retrieved from https://studentshare.org/technology/1531436-firewall-architectures-and-techniques-a-study-on-the-high-speed-network-security-they-provide
(Firewall Architectures and Techniques A Study on the High Speed Essay)
https://studentshare.org/technology/1531436-firewall-architectures-and-techniques-a-study-on-the-high-speed-network-security-they-provide.
“Firewall Architectures and Techniques A Study on the High Speed Essay”, n.d. https://studentshare.org/technology/1531436-firewall-architectures-and-techniques-a-study-on-the-high-speed-network-security-they-provide.
  • Cited: 0 times

CHECK THESE SAMPLES OF Firewall Architectures and Techniques A study on the high speed network security they provide

Wireless network implementation (Enterprise Network Design (Aston))

long with lack of redundancy, there were many security concerns.... Aston has recently reached the limits of its network.... As a result, this network upgrade will help Aston to grow and stay on top for many years to come.... One problem with the current network is the reliability.... QoS will also be implemented in all layers of the network to improve performance.... These accounts are served worldwide by their franchise network....
9 Pages (2250 words) Case Study

Global Finance Inc Network Management

These systems enable computers to receive and send data across public or shared networks as if it is it had a direct link to the private network; hence, it benefits from the security, management functionality policies of the private network.... The paper "Global Finance Inc network Management " discusses that the network was operating slower than it could have possibly due to high volume, and there were attacks on the servers that could have been from unauthorized users accessing the servers....
8 Pages (2000 words) Case Study

The Basic Architecture of a Secured Network

he architecture of the network shown in the diagram is to provide web-based services to the external (internet) users and LAN services to the internal (corporate staff) users by employing a certain level of security.... The paper "The Basic Architecture of a Secured Network" highlights that each component of the entire network can be simulated using a model and the theoretical values of Overall security Values can be determined.... In an event of breach, if the attacker gets past the security of one of the DMZ servers, he has a perfect path to the internal networks....
10 Pages (2500 words) Case Study

Network Scanning Over the World

And there are hugely valuable tools useful for network security.... The concept of the network scanning is that it is a process to establish active hosts on a network for the objectives of network security assessment or attacking them.... Thereon, the report moves on to provide a description of Nmap, an intelligent device for checking the accuracy of the scanned data.... Some of them help in identifying active hosts on a network from attacking or security purposes....
8 Pages (2000 words) Case Study

The Features and Requirements of Network Security

This case study describes the features and requirements of network security.... This paper outlines features of network technology, cabling, network interfaces, network protocols, requirements for all these parts, data and security requirements, firewall and network performance.... The data will be stored on the server providing better security and centralized data protection.... The security patches and antivirus definition files can be administered on the server....
7 Pages (1750 words) Case Study

The Proposed Network Architecture of Entex Insurance Company

This case study "The Proposed Network Architecture of Entex Insurance Company" presents Reliable Network Systems that provide effective communication between various computers on the same network.... They also provide efficient resource sharing without compromising on data integrity and security.... n efficient network system should be able to provide remote communication within the computers connected to it while maintaining a secure networking environment....
5 Pages (1250 words) Case Study

Mobile Application Security Issues

Likewise, the vulnerabilities of the mobile operating system do not provide any linking between the threats that may impact them.... The paper "Mobile Application security Issues"  overviews mobile security issues associated with all layers of the 'OSI model',  recent threats along with their behavior and triggers that led them to successfully breach the network or mission-critical data of an enterprise.... hellip; The security of mobile devices is now one of the most critical success factors for an enterprise and 'Information Technology' decision-makers....
12 Pages (3000 words) Case Study

Information System Strategy of HTC Computer Manufacturing Company

… The paper "Information System Strategy HTC" is a perfect example of a case study on information technology.... The paper "Information System Strategy HTC" is a perfect example of a case study on information technology.... Still, on Laudon & Laudon, the three elements that provide an overview of business challenges for most if not all organizations are management, technology, and organization (InformationWeek 2008).... As a manufacturer of high-end smartphones and tablets, HTC is dependent on other corporations to deliver quality devices to their customers....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us