Pages
76
Words
18,498
Chapters
5
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
THE USE OF FIREWALL IN INTERNET SECURITY
Categories
Table of contents
CHAPTER ONE
1.0 Introduction 1
1.1 Statement of Problem 2
1.2 Method of Analysis 2
1.3 Method of Analysis 3
1.4 Organization of the Study 3
1.5 Explanation of terms 4
1.5.1 Network threats 4
1.5.2 Network protection 4
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction 6
2.1 Background 7
2.1.1 Network Security 8
21.2 Network History 9
2.2 Definitions 11
2.2.1 Stakeholders 11
2.2.1.1 Participation in system design 12
2.2.1.2 Information and computer security 13
2.3 Introduction to firewall 16
2.3.1 What are Firewalls? 17
2.3.2 The Purpose of Firewall 18
2.3.2.1 The Firewall Role of Protection 19
2.3.2.2 Firewalls Access Control 20
2.3.3 The Security Roles of a Firewall 21
2.3.4 Promoting Privates with Firewall 21
2.3.5 Advantage and Disadvantages of firewall 22
2.4 Firewall Components 23
2.4.1 Network Security Policy 23
2.4.2 Packet Filtering 26
2.5 Procuring a Firewall 26
2.5.1 Assessment 27
2.5.2 Buying a Firewall 28
2.5.3. Building a Firewall 28
2.5.4 Setting it up 29
CHAPTER THREE
3.1 Introduction 31
3.1 Categories of Firewall 31
3.1.1 Packet Filters 31
3.1.1.1 Weakness of Packet Filtering Firewalls. 31
3.1.2 Application-Level Firewalls 32
3.1.2.1 Advantages of Application Level Firewalls 32
3.1.3 Hybrid Firewalls 33
3.1.3.1 Weakness of Hybrid Firewalls 33
3.1.4. Second Generation Application Level Firewall 33
3.1.4.1 Advantages of second generation application level firewalls 33
3.2 Selection of Firewalls 33
3.3 Security Policy Consideration 35
3.3.1 Physical Consideration 38
3.3.2 Access Control Consideration 38
3.3.3 Authentication Consideration 39
3.3.4 Encryption Consideration 39
3.3.5 Security Auditing 39
3.3.6 Training Consideration 39
3.4 Responding to a Network Attack 40
3.4.1 How to deal with an Incident 41
3.4.2 To do List in Case of Incident 42
3.5 Persecuting the Hacker: the Position of the Legal system 49
3.5.1 Reasons for legal security and protection 49
3.5.2 Global Trend on Legal Security 49
3.5.3 The Nigerian approach 50
3.5.4 Protecting your Corporate Site 50
3.5.5 Preventing Break-ins at your Site 51
3.6 Setting up a Security Policy 52
CHAPTER FOUR
4.0 Analysis of Design 58
4.1 CISCO IOS Firewall Deployment Scenarios 58
4.1.1 Scenario 1: Protect Internet Connection at Remote Site (“Split Tunneling”) 59
4.1.2 Scenario 2: Protecting Servers at Remote Site 59
4.1.3 Scenario 3: Protecting Head office and WAN Link 60
4.1.4. Scenario 4: Transparent Firewall 60
4.1.5. Virtualization: CISCO IOS Firewall URL Filtering 60
4.2 Firewall Maintenance 61
4.2.1 Keeping the Firewall in Tune 61
4.2.2 System Monitoring 62
4.2.2.1 Monitoring the Unmonitored Threats 62
4.2.3 Preventing and Curative Maintenance 63
4.2.3.1 Preventing Security Breaches 65
4.2.3.2 Security holes identification 65
4.2.4 Firewall Recycling 66
CHAPTER FIVE
5.0 Summary 67
5.1 Conclusion about the Research Problem 67
5.2 Limitations 68
5.3 Conclusions 68
5.4 Recommendation for Further Research 68
References 69
Abstract
The aim of this project is to investigate the use of firewalls in the internet security, and how designers and organization can ensure that this security mechanism is effective and efficient in practice.
It is no doubt that the advent of the internet was remarkable breakthrough since the advent of computer, but much attention has not been paid to its security until recent time and the use of firewalls most especially has put many insecurity cases to rest.
A review of the literature of security design and the use of firewalls in security reveals and implementing a firewall that can guarantee the utmost trust expected by end users.
The CISCO system IOS deployments scenario gives us a platform to analyze firewall for more understanding. Moreover, a well-developed and implemented firewall has not achieves the desired purpose if it is not properly maintained.
Please Note:
We represent an esteemed online resource center duly registered with the Corporate Affairs Commission (CAC). Our commitment to integrity and reliability underscores our ethos, ensuring that our services are delivered with utmost trustworthiness. It is our solemn assurance that we conduct our operations with the highest ethical standards, thereby precluding any possibility of deception or fraudulent activities. Guided by our reverence for ethical conduct, we pledge to uphold the principles of honesty and transparency in all our dealings. Rest assured, upon confirmation of your payment, our dedicated team endeavors to promptly furnish you with the requisite project materials within a timeframe of 30 minutes.
We further emphasize that the materials provided are intended for reference purposes, and it is incumbent upon the buyer to adapt and tailor the content to meet their specific requirements. It is imperative to exercise due diligence in ensuring that any utilization of the project or research content is in accordance with academic integrity standards, thus mitigating the risk of plagiarism
Projects are sent in MS word format within 30 minutes - 60 minutes of payment confirmation. For questions and complaints call or WhatsApp: +2348062235854 or +2348166784138
NOTE: By ordering for this material, you have read and agreed with our Terms of use
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
Feature Project Topics
-
IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY ON TEACHING AND LEARNING IN SENIOR SECONDARY SCHOOLS IN OYO STATE
Computer Science31
7,378
3
-
MEDICINAL PLANTS AND PHYTOCHEMICAL ANALYSIS OF Nauclea latifolia
Chemical Science29
5,474
5
-
SKILLS ACQUISITION ON ENTREPRENEURSHIP DEVELOPMENT (A CASE STUDY OF SKYE BANK)
Business Administration70
13,912
5
-
INVESTIGATION ON THE INACTIVATION OF EXTENDED SPECTRUM BETA LACTAMASES USING OCIMUM GRATISSIMUM (SCENT LEAF)
Microbiology40
7,939
5
-
RECENT ADVANCES AND USES OF MICROORGANISMS IN VARIOUS FIELDS OF SCIENCE
Microbiology60
11,632
5