StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Firewall Applications - Essay Example

Cite this document
Summary
A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses’ intrusion. These external threatening agents often attack a computing device when it is connected to another external computing device that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Firewall Applications
Read Text Preview

Extract of sample "Firewall Applications"

Firewall Applications Submitted to, Submitted By, of the Submitted on, [November 6th, INTRODUCTION A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses’ intrusion. These external threatening agents often attack a computing device when it is connected to another external computing device that may be affected with a malware. This connection may be via a network etc. Figure 1: Graphical Representation of a Firewalls Location.

Firewall prevents unauthorized access to a computing device by checking every message transfer to and from the computing device. It restricts any message transfer that does not comply with the defined security standards embedded in it. Firewalls protect a computing device throughout its connection to the internet by continuously monitoring all its activity. Present day firewalls are present in a variety of ranges. Three of the most widely used firewalls are presented in the review below:FIREWALL NUMBER 1: Comodo FirewallFUNCTIONALITYIt is useful for both lightly skilled and advanced users.

It possesses active HIPS. Its significant features are that it includes a personal firewall and a light sandbox component. It is available in two modes namely the ‘Defense Mode’ and the ‘Security’ Mode. Automatically configures itself on a PC after installation. COST$39.99. SUPPORTBuilt in Help and Support. PLATFORM OF USE:Windows XP (SP2), Vista, Windows 7 (128 MB RAM). Not available for portable devices.FIREWALL NUMBER 2: Online Armor PremiumFUNCTIONALITYThe software reduces popups by allowing only the trusted set of programs to access the internet.

It determines the set of trusted and non- trusted programs by maintaining a set of sites that may attract potential scam. The Firewall passes all the known leak tests in order to protect the host computing device. Survives spy attempts and transfer of diseased files that may sometimes survive system reboots. Detects and acts against applications that assign themselves substantial system privileges.“Banking Mode” is a salient feature. In it, the firewall remains in a banking mode throughout the time the computing device is connected to the internet.

During its connection the banking mode of the firewall prevents the host from scams and also from entering the phishing websites.COST$39.95SUPPORTInteractive Support Present.PLATFORM OF USEWindows XP, Vista, Windows 7. FIREWALL NUMBER 3: Kaspersky Internet Security.FUNCTIONALITYIt is a two-way firewall that monitors every connection to a computing device. It provides Protection from Trojan Horses, Viruses and Worms. Spyware and Adware are restricted. The firewall Scans files, Internet services and all connections for any possible intrusion.

It also Prevents access to unwanted websites. An edge that it has over other firewalls is that if a computer is already infected it restores the computer to its prior state.COST$ 79.95SUPPORTAvailable with software.PLATFORM OF USEWindows XP, Windows Vista, Windows 7.RECOMMENDATION:It is recommended to my elder sibling that Online Armor Premium Firewall be installed in his home PC. This is because in a reasonable cost it provides adequate support that should be present in any firewall software.

Especially its feature of maintaining a databank of trustable and non-trustable sites reduces the number of popups for the system user thus increasing its usability.REFERENCES:Top Ten Reviews (2011) Kaspersky Internet Security 2011. Personal Firewall Software Review. Retrieved from http://personal-firewall-software-review.toptenreviews.com/kaspersky-internet-security-details.htmlTop Ten Reviews (2011) Comodo Internet Security Plus 2011. Personal Firewall Software Review. Retrieved from http://personal-firewall-software-review.

toptenreviews.com/comodo-internet-security-pro-review.htmlTop Ten Reviews (2011) Online Armor Premium 5. Personal Firewall Software Review. Retrieved from http://personal-firewall-software-review.toptenreviews.com/online-armor-premium-review.html

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewall Applications Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Firewall Applications Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1583176-firewall-applications
(Firewall Applications Essay Example | Topics and Well Written Essays - 500 Words)
Firewall Applications Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1583176-firewall-applications.
“Firewall Applications Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1583176-firewall-applications.
  • Cited: 0 times

CHECK THESE SAMPLES OF Firewall Applications

Organizing for Success: From Inequality to Quality

Darling-Hammond (2010) reports, "the bureaucratic school created at the turn of the 20th century was not organized to meet these needs for intellectual development or for individual responsiveness.... Most of todays schools were designed.... ... ... ot to educate all students well but to… 237). Darling-Hammonds point in the above statement is valid to a certain extent in that most American public schools today are not providing adequate education to students to Organizing for Success: From Inequality to Quality Darling-Hammond reports, "the bureaucratic school created at the turn of the 20th century was not organized to meet these needs for intellectual development or for individual responsiveness....
1 Pages (250 words) Admission/Application Essay

Vulnerability

However, the worm successfully penetrated the several systems in the Davis-Besse power plant control room to a larger extent given that the business network for its corporate offices had a multiple internet connection to bypass the control room firewall.... This can be defined as the use of computers as weapons and targets by politically influenced nations or clandestine agents who threaten to cause violence and fear so that they can influence and force governments to change their policies in a way that can favor them....
1 Pages (250 words) Admission/Application Essay

NYS Department of Education Application Essay Part 2

The various observations made by you are very pertinent to my teaching and would help me improve and improvise my teaching performance and students' achievement.... I would work on them and prepare lesson plans that would ensure their… The front row students were attentive during lesson introduction while the students in the last row whispered and sought directions....
1 Pages (250 words) Admission/Application Essay

Dependence on IT in Business Operations

As organizations continue to increase their dependence on IT in business operations, information security has continuously presented numerous challenges.... Information security has become a dynamic and complex function, which provides an approach for information security managers… This dependence on computers has necessitated the inclusion of technology-based information security systems that seek to ensure protection of Information is an important asset to the organizations and its protection is critical to the sustainability of organizational operations....
5 Pages (1250 words) Admission/Application Essay

The Position of Senior Systems / Network Engineer

The author of the paper is writing to be considered for the position of Senior Systems / Network Engineer as advertised in the media under Ref KP955-944.... The author would like to join a team so that he can use his skills and knowledge in helping the organization achieve its objectives and fulfill its mission....
1 Pages (250 words) Admission/Application Essay

Senior System Administrator/Engineer Position

This paper is a letter to the advertisement for the senior system administrator/ engineer position.... As a capable network engineer with a good technical background and proven record in building, maintaining and troubleshooting computer systems and networks, the author offer skills that will benefit the company....
1 Pages (250 words) Admission/Application Essay

It Isn't Enough to Talk about Peace

In the paper “It Isn't Enough to Talk about Peace” the author describes what has driven him from a humble upbringing to the thresholds of Monash University.... It believes in fostering creativity through education and research.... His fascination with computers started surfacing early on in school itself....
2 Pages (500 words) Admission/Application Essay

Application for a Vacancy to Pursue an MBA in George Fox University

This paper stresses that the reporter interested in obtaining an MBA as a way a channel for augmenting his knowledge of the business world.... Given his undergraduate training in media, an MBA will be ideal in introducing and equipping his with ample know the edge of business.... nbsp;… According to the paper, his interest in obtaining an MBA is also underpinned by his desire for leadership and personal development....
2 Pages (500 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us