Firewall Security



EOI: 10.11242/viva-tech.01.04.169

Download Full Text here



Citation

Ankit kadam,Prof.Shreya Bhamare, "Firewall Security", VIVA-IJRI Volume 1, Issue 4, Article 169, pp. 1-7, 2021. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.

Keywords

Firewall technologies, network security, access control, security policy, protective mechanisms

References

  1. “F. M. Avolio, Firewalls: Are We Asking Too Much?",http://www.crossnodes.com/icsa/perimeter.html
  2. S. M. Bellovin, Distributed Firewalls, “;login:” November 1999, Special Issue on Security, ISSN 1044-6397, Also at: http://www.usenix.org/.
  3. Check Point Firewall-1, version 3.0 White Paper, June 1997. http://www.checkpoint.com/products/whitepapers/wp30.pdf .
  4. ICSA,ICSAFirewall Policy Guide V2.00, Security White Paper series,http://www.icsa.net/services/consortia/firewalls/fwpg.shtml
  5. H. Abie, CORBA Firewall Security: Increasing the Security of CORBA Applications, January 2000.
  6. W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security,Repelling the Wily Hacker, Addison-Wesley Publishing Company, 1994
  7. OMG, The CORBA Security Service Specification (Revision 1.2),ftp://ftp.omg.org/pub/docs/ptc/98-01-02.pdf, January 1998