• Home
  • Subjects
  • Technology
  • Firewall Architectures and Techniques A study on the high speed network security they provide.

Firewall Architectures and Techniques A study on the high speed network security they provide. - Essay Example

Extract of sample
Firewall Architectures and Techniques A study on the high speed network security they provide.

Different firewall architectures and techniques provide different correlation of performance vs. security. When considering alternative firewall technologies, a common question is "what are the trade-offs between performance and security" (Cisco Systems, 2002) To answer to this question, various firewall architectures should be regarded and analysed.
Various aspects of network security are explored, such as security policy, bastion host, packet filter, proxy server, network address and architecture. (Technology Investigation Center, 2002) There are four main generations of firewall architectures: packet filters, circuit level firewalls, application layer firewalls and dynamic packet filters. Also a number of firewall products exist from various producers.
A variety of network threats exist, such as network packet sniffers, IP spoofing, password attacks, denial-of-service attacks or application layer attacks. Therefore network administrators are working hard to protect their networks using various tools that help them to test and improve network security. Firewall takes the central place among such tools restricting access between a protected (internal) network and the Internet or other networks.
One of the most important problems using firewall is its ability to resist network attacks. ...
Download paper

Summary

With the fast development of Internet and enterprise networks, security becomes an important concern to companies all over the world. There are variety of tools and techniques to break the security of the intranet network, so it becomes more and more difficult to protect the network of an enterprise that is the mission of network firewall.
Author : brownkatrine
Download 1

Related Essays

Network Security
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets
...
10 pages (2510 words) Research Paper
The High Speed Train
The HST is due to be replaced in a few years, and designers at all of the major rolling stock manufacturers are hard at work trying to come up with an equally successful replacement.
...
8 pages (2008 words) Essay
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National...
5 pages (1255 words) Essay
Computer Network Security Methods
The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees, e-banking and many other data access and electronic facilities have become the order of the day. Almost any function of sale, purchase, transfer or sharing of data, conduct of on line university...
24 pages (6024 words) Essay
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This point signifies the fact that there are no notable security measures at least for the ground floor. The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor...
7 pages (1757 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!