Got a tricky question? Receive an answer from students like you! Try us!

Firewall Architectures and Techniques A study on the high speed network security they provide. - Essay Example

Only on StudentShare
Undergraduate
Essay
Technology
Pages 2 (502 words)

Summary

With the fast development of Internet and enterprise networks, security becomes an important concern to companies all over the world. There are variety of tools and techniques to break the security of the intranet network, so it becomes more and more difficult to protect the network of an enterprise that is the mission of network firewall.

Extract of sample
Firewall Architectures and Techniques A study on the high speed network security they provide.


Different firewall architectures and techniques provide different correlation of performance vs. security. When considering alternative firewall technologies, a common question is "what are the trade-offs between performance and security" (Cisco Systems, 2002) To answer to this question, various firewall architectures should be regarded and analysed.
Various aspects of network security are explored, such as security policy, bastion host, packet filter, proxy server, network address and architecture. (Technology Investigation Center, 2002) There are four main generations of firewall architectures: packet filters, circuit level firewalls, application layer firewalls and dynamic packet filters. Also a number of firewall products exist from various producers.
A variety of network threats exist, such as network packet sniffers, IP spoofing, password attacks, denial-of-service attacks or application layer attacks. Therefore network administrators are working hard to protect their networks using various tools that help them to test and improve network security. Firewall takes the central place among such tools restricting access between a protected (internal) network and the Internet or other networks.
One of the most important problems using firewall is its ability to resist network attacks. ...
Download paper
Not exactly what you need?

Related Essays

Network Security
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service (QoS) levels to different packets…
10 pages (2510 words)
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National…
5 pages (1255 words)
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This point signifies the fact that there are no notable security measures at least for the ground floor. The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor…
7 pages (1757 words)