An Overview of Firewall Technologies
نویسنده
چکیده
The increasing complexity of networks, and the need to make them more open due to the growing emphasis on and attractiveness of the Internet as a medium for business transactions, mean that networks are becoming more and more exposed to attacks, both from without and from within. The search is on for mechanisms and techniques for the protection of internal networks from such attacks. One of the protective mechanisms under serious consideration is the firewall. A firewall protects a network by guarding the points of entry to it. Firewalls are becoming more sophisticated by the day, and new features are constantly being added, so that, in spite of the criticisms made of them and developmental trends threatening them, they are still a powerful protective mechanism. This article provides an overview of firewall technologies.
منابع مشابه
Editorial : Sustainable Development of Cognitive Science and Technology Ecosystem an Overview to the “Human Brain Project” as a Functioning Sample
متن کامل
The effects of fasting on physiological status and gene expression; an overview
Calorie restriction through ingesting no or minimal amounts of food and caloric beverages for periods of time is called fasting. Fasting can affect body through changing in physical and metabolic adaptations, as well as mineral and hormonal status. However, psychological effects and sometimes medical complications are likely in case of inappropriate fasting. Fasting is associated with changes i...
متن کاملProtecting a Private Network: The AltaVista Firewall
Vol. 9 No. 2 1997 17 The advent of electronic commerce as a means of conducting business globally has resulted in an increasing number of organizations connecting their internal private networks to the Internet. Most users of the Internet and the World Wide Web (WWW) view the technologies involved as leading edge, but many are unaware that the foundations on which these technologies are built a...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملOn Firewalls and Tunneling
This paper gives a comprehensive overview of the stateof-the-art in rewall and tunneling technologies. We describe the major rewall components and several approaches for legitimate and illegitimate tunneling techniques and investigate their interrelations. Finally we shortly introduce a highly adaptable tunneling application, having the potential to circumvent virtually every rewall system.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000