StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

How does a hardware firewall work - Term Paper Example

Cite this document
Summary
Therefore, networking computers becomes essential to the organization. In addition, networks are simply a collection of computers linked by cable or other media so that they can…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
How does a hardware firewall work
Read Text Preview

Extract of sample "How does a hardware firewall work"

Download file to see previous pages

Therefore, firewall is an effective solution to deal with these issues. This paper will present a detailed analysis, implementation, and working of the hardware firewall technology. This paper will also outline the role of firewalls in the security matters. The massive utilization of the internet and the World Wide Web places networks at even larger danger of unwanted threats. In addition, many corporations distribute information on the internet (using web sites), while remaining have workers who distribute information to the internet from the corporation’s network or download material from the internet (Norton).

At the present, increasing numbers of organizations are exposing their personal networks to internet traffic; therefore, the implementation of firewalls has turned out to be a basic requirement. In addition, the firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internet (Laudon and Laudon; Turban, Leidner and McLean; Turban, Rainer and Potter, Introduction to Information Technology,3rd Edition).

In addition, Firewalls can be either software or hardware. However, the best firewall arrangement will contain both (Beal). In point of fact, a firewall can divide a network into several domains. A general execution the firewall has the Internet as un-trusted domain; a semi trusted and a semi secure network, acknowledged the demilitarized zone (DMZ), as an additional domain; and an organization’s computers as third domain (Silberschatz, Galvin and Gagne 673). “Hardware firewalls are external devices that perform job of a guard between organization’s network (office or home) and external networks (the internet)” (Antivirus-Firewall-Spyware).

According to Beal (2009), the hardware firewalls are

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How does a hardware firewall work Term Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
How does a hardware firewall work Term Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1561959-how-does-a-hardware-firewall-work
(How Does a Hardware Firewall Work Term Paper Example | Topics and Well Written Essays - 1250 Words)
How Does a Hardware Firewall Work Term Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1561959-how-does-a-hardware-firewall-work.
“How Does a Hardware Firewall Work Term Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1561959-how-does-a-hardware-firewall-work.
  • Cited: 0 times

CHECK THESE SAMPLES OF How does a hardware firewall work

Major Importance of Network Security

Full Paper Title Name University Network Security In a world where information flows incessantly, companies usually spend a lot of in their endeavor to attain secure computer systems, including servers, firewall and security software, in addition to other areas of computer security such as the physical space and the rules of access.... The most popular network security appliance that is used in almost every small or corporate network to provide security is a firewall....
5 Pages (1250 words) Research Paper

Aviation Security Prerequisites

Likewise, for augmenting the primary phase of work propagation, it uses a 'hit list' comprising of overflowed users i.... This paper ''Aviation Security'' tells that After September 2011 terrorist attacks, developed countries have significantly changed the way of countering vulnerabilities....
12 Pages (3000 words) Essay

Increasing Security with Limited User Accounts and Restricted Groups

To get a point-to-point WAN link, you would work with a service provider to install a circuit.... The paper describes the proper use of controls minimizes threats to data, software and hardware.... Because a company that needs to send data over the WAN circuit does not actually own the cable or line, it is called a leased line.... The extent to which we decide to implement security precautions will depend upon how sensitive our data is, how large our network is, and how susceptible it is to attack....
9 Pages (2250 words) Research Paper

Firewalls and Proxy Servers

Our organization employs both hardware and software firewalls and any solution for enhancing the defense of our network system, or protecting us from the Internet's hostile environment, will operate in conjunction with our firewall system.... At the present moment, we are involved in the implementation of a Stego system to operate in conjunction with our firewall system.... In order to better understand how the one will compliment and enhance the other, it is necessary that I overview our operative firewall system....
5 Pages (1250 words) Essay

Firewall Security Measures

Admittedly, layers 3 and 4 of OSI models use packet filtering as a firewall security measures, with IP address in the packets, and also the ports used to filter session that is admitted or otherwise drop.... Hence, it is stated that one good decision for testing a firewall is by hiring a third party penetration tester, which likewise tests the whole network system for vulnerabilities.... A packet filter is the most simple type of firewall that operates at the network layer of OSI model....
13 Pages (3250 words) Essay

Security aspects of network

This paper “Security aspects of network” adopts a problem solving approach to the scenario.... So this paper proceeds with discussing the problems encountered in the implementation of a LAN and a WAN.... Then solutions are suggested with the use of relevant technologies.... hellip; The author states that while Wi-Fi networks are often seen as simple and inexpensive to deploy, there are plenty of hidden costs and complexities lurking under the surface....
15 Pages (3750 words) Essay

The Features and Requirements of Network Security

This will reduce the administrative work on the network for the network administrator.... This paper outlines features of network technology, cabling, network interfaces, network protocols, requirements for all these parts, data and security requirements, firewall and network performance.... The current network scenario does not contain proper security measures, contingency planning, back up procedures, data synchronization, data traffic analysis, network congestion prevention....
7 Pages (1750 words) Case Study

Computer Networks and Security

The firewall will, therefore, help cut out external threats from getting into the organization.... In other wanting cases, the firewall will allow the administrator to block accessibility to the firewall.... The policy concerning firewalls States issues on management and updating of the firewall.... It dictates how the firewall will handle traffic about the email and the web.... In creating a firewall's policy, considerations include analysis of the risks, choosing applications in the network, and pinpointing vulnerabilities in the applications....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us