Firewall Technologies. Advantages and Limitations
Downloads
Currently, most businesses are based on a more or less developed IT system. For daily activities, the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, with the benefits of using the Internet, there are also the security risks the organization needs to minimize through appropriate measures and controls. Security issues arising from Internet use include hacker attacks, virus infection, malware, and spyware. Hackers can theoretically get into the organization's network and steal confidential data, damage the organization's computers or the entire local network, use the organization's resources to be an employee of the organization, etc. Thus, a necessary security measure at the level of any organization's network is the implementation of firewalls. This paper aims to describe what is a firewall, firewall types and technologies. The paper will not present types of firewall architectures and details of their deployment, as well as details of how to configure these devices.
Downloads
Abie, Habtamu (2000). An overview of Firewall Technologies.
Godwiak, Adam (2003). Techniques used for bypassing firewall systems.
Hill, Jake (1998). Bypassing Firewalls: Tools and Techniques.
Irby, David (2005). Firewalk: Can Attackers See Through Your Firewall?, SANS Institute.
ISACA (2011). Certified Information Systems Auditor – CISA Review Manual 2011.
Noonan Wes, Dubrawsky Ido (2006), Firewall Fundamentals, Cisco Press.
Northcutt Stephen, Zeltser Lenny, Winters Scott, Kent Karen, Ritchey Ronald W. (2005). Inside Network Perimeter Security, Second Edition, Sams Publishing.
Peterson Larry, Bruce Davie (2007). Computer Networks. A system approach, Fourth Edition, Elsevier.
Scarfone Karen, Hoffman Paul (2009). Guidelines on Firewalls and Firewall policy. National Institute of Standards and Technology (NIST).
Stallings, William (2011). Cryptography and network security. Principles and Practice, Fifth Edition, Prentice Hall.
Stewart James Michael, Tittel Ed, Chapple Mike (2005). CISSP – Certified Information Systems Security Proffesional Study Guide, Third Edition, Sybex.




