Studyspark Study Document

Firewall to Protect Companies a Firewall Is Essay

Pages:2 (559 words)

Sources:2

Subject:Technology

Topic:Firewalls

Document Type:Essay

Document:#17519463


Firewall to Protect Companies

A firewall is used to protect a person or business' network from exterior harms. Firewall may use packet filtering, user or client application authentication in order to protect the network. The actual process of protecting a network requires a firewall to filter incoming packet sizes, source IP address, protocol, and destination port. Administrators of a network are able to enact firewall protection on a router and this is often the first level of protection the network has against harm.

Along with being a primary protection, firewalls in routers are also beneficial to those not skilled or knowledgeable in firewall protection. Customers are able to install the firewall between their network and external internet connection on their own without assistance. Router-based firewall offers ease to those who use it and is used as a primary source of protection. Overall, it is far more practical to implement a router with firewall capabilities than not.

As security for the school system, it will be important to protect administrative offices, classroom computers, web-servers, and email servers from external risks. Multiple layers of firewall may be used to protect against these risks if placed in proper locations. Like many organizations, the school will operate using a demilitarized zone (DMZ). This will use two separate firewalls: One to protect incoming threats and one to protect outgoing threats. Inside the DMZ, web servers and email servers will receive optimum security. In the event of an external security breach, only these servers would be compromised, rather than all school data. It is common for the DMZ to physically be two separate firewalls. The two separate firewalls make the time delay a…


Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Firewalls Great Network Security Devices but Not a Silver Bullet Solution...

Pages: 5 (1472 words) Sources: 10 Subject: Education - Computers Document: #64893963

Firewalls: Great Network Security Devices, but Not a "Silver Bullet" Solution In construction, a firewall is a hardened divider between the hostile external environment outside and what needs to be protected inside. Similarly, firewalls are designed to protect computers from being accessed by unauthorized individuals, and for the most part, they perform this task well. Unfortunately, firewalls are also akin to the castles of old when siege weapons were built to

Studyspark Study Document

Firewalls Computers Have Become an

Pages: 8 (2053 words) Sources: 1+ Subject: Education - Computers Document: #74797621

Which Products are Best Suited to a Small LAN With One Publicly Accessible Web Site: Cisco PIX Firewall Software is an excellent solution for small LANs with one publicly accessible web site. "Integrated Cisco PIX firewall hardware and software delivers full stateful firewall protection and IP Security (IPSec) VPN capabilities, allowing (...) rigorous (protection of...) internal network from outside intrusions" ("Cisco PIX," 2005). Cisco PIX firewall differs from typical CPU-intensive full-time

Studyspark Study Document

Protecting People and Information Threats and Safeguards

Pages: 5 (1483 words) Sources: 3 Subject: Education - Computers Document: #72965181

Protecting People and Information: Threats and Safeguards In this contemporary era, we are living in a world that rotates around "Information Economy." This means that the wheels of the world no longer run predominantly on agricultural products or merchandise. The secret of surviving in the present days is the creation and propagation of information (Hill & Pemberton, 1995). Information is vital for the continuous functioning of every venture. Today, information has been

Studyspark Study Document

Information Technology Hilcorp Energy Company

Pages: 12 (3743 words) Sources: 10 Subject: Business Document: #97129244

Remote access controls. Network security management. Password policies. Compliance with the policies and procedures of the company is very vital to the organization, and the policies and procedures should be clearly communicated to the appropriate business teams. Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization

Studyspark Study Document

Company, Stellar Systems Consulting Is

Pages: 5 (1577 words) Sources: 5 Subject: Education - Computers Document: #60898242

This stage is also a synthesis of various other stages. In the last, the system is described as a collection of modules or subsystems. In this stage, modular and subsystems programming code will take effect, and then the individual modules will be tested before they are integrated in the next level. The code is tested and retested at various levels; system, unit, and user acceptance testing are often performed depending on

Studyspark Study Document

Company Is a Reputable Organization

Pages: 4 (1201 words) Sources: 4 Subject: Education - Computers Document: #80691180

Apart from the Firewall and IDS for the network security, the company will also integrate encryption system to protect the company network devices. Encryption Encryption is very effective for enhancing security devices of our information systems. The encryption system will assist in enhancing confidentiality and integrity of our information systems. More importantly, encryption will be effective in enhancing our network security because it will protect our system from network-based attacks such as

Join thousands of other students and

"spark your studies".