Search icone
Search and publish your papers

Security using firewalls

Or download with : a doc exchange

About the author


About the document

Published date
documents in English
term papers
6 pages
0 times
Validated by
0 Comment
Rate this document
  1. Abstract
  2. Introduction
  3. A model for network security
  4. Attack model
  5. Defending against attacks
  6. Meaning of a firewall
  7. Characteristics of firewall
  8. Working of firewall
  9. Kinds of firewalls
  10. A firewall in an IT system
  11. Short comings of a firewall
  12. Conclusion
  13. References

In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect the data and messages, and to protect systems from network based attacks. As we tend towards a more and more computer centric world, the concept of data security has attained a paramount importance. Though present day security systems offer a good level of protection, they are incapable of providing a ?trust worthy? environment and are vulnerable to unexpected attacks. The generic name for the collection of tools design to protect data and to thwart hackers is computer security.

[...] A firewall provides a location for monitoring security related events. Audits and alarms can be implemented on the firewall system. A firewall convenient platform for several internet functions that are not security related. These include a network address translator, which maps to local address to internet address, and a network management function that audits or logs internet usage. A firewall serves as the platform for IP sec. HOW A FIREWALL WORKS Packets: When messages are sent along the internet, they are broken up into small ?packets' that take different routes to get to the destination. [...]

[...] Security accepts come into play when it is necessary or desirable to protect the information transmission from an opponent who may present a threat to confidentiality, authenticity, and so on. All the techniques for providing security have two components: A security- related transformation on the information to be sent. Examples include the encryption of the message, which scrambles the message so that it is unreadable by the opponent, and the addition of code based on the contents of the message, which can be used to verify the identity of the sender. [...]

Similar documents you may be interested in reading.

The Specific Methods that can be used by the Organization to improve the overall security of its...

 Science & technology   |  Electronics   |  Presentation   |  06/17/2008   |   .doc   |   5 pages

Security through identification versus security of privacy

 Science & technology   |  Computer science   |  Presentation   |  09/29/2010   |   .doc   |   16 pages

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages