Pages
71
Words
16,457
Chapters
5
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
USE OF FIREWALL IN INTERNET SECURITY
Categories
Table of contents
Chapter One: Introduction 1
1.1 Background to the Study 1
1.2 Statement of the Problem 3
1.3 Aim and Objectives of the Study 4
1.4 Methodology 5
1.5 Scope of the Study 5
1.6 Source of Data 5
1.7 Operational Definition of Terms 5
1.7.1 Network Threats 5
1.7.2 Network Protection 6
1.8 Organization of the Study 7
Chapter Two Literature Review 8
2.0 Introduction 8
2.1 History of Computer Security 9
2.2 Network Security 10
2.3 Threat to Network Security 12
2.4 Firewall 17
2.4.1 Working of Firewall Management 21
2.4.2 Other Types of Firewalls 22
2.4.3 Firewall Limitation 25
CHAPTER THREE: Firewall Design and Implementation 26
3.1 Introduction 26
3.1 Categories of Firewall 26
3.1.1 Packet Filters 26
3.1.1.1 Weakness of Packet Filtering Firewalls. 26
3.1.2 Application-level Firewalls 27
3.1.2.1 Advantages of Application Level Firewalls 27
3.13 Hybrid Firewalls 28
3.1.3.1 Weakness of Hybrid Firewalls 28
3.1.4. Second Generation Application Level Firewall 28
3.1.4.1 Advantages of Second Generation Application level Firewalls 28
3.2 Selection of Firewalls 28
3.3 Security Policy Considerations 30
3.3.2 Physical Considerations 33
3.3.3 Access Control Consideration. 33
3.3.4 Authentication Consideration 34
3.3.5 Encryption Consideration 34
3.3.6 Security Auditing 34
3.3.7 Training Consideration 34
3.4 Responding to a Network Attack 35
3.4.1 How to Deal with an Incident 36
3.5.1 To do List in Case of Incident 40
3.5.1 Reasons for Legal Security and Protection 44
3.5.2 Global Trend on Legal Security 45
3.5.3 The Nigerian Approach 45
3.5.4 Protecting your Corporate Site 46
3.5.5 Preventing Break-ins at your site 46
3.6 Setting Up a Security Policy 47
CHAPTER FOUR: Analysis of Design and Firewall Maintenance 53
4.0 Analysis of Design 53
4.1 CISCO IOS Firewall Deployment Scenarios 53
4.1.1 Scenario 1: Protect Internet Connection at Remote Site (“Split Tunneling”) 54
4.1.2 Scenario 2: Protecting Servers at Remote Site 54
4.1.3 Scenario 3: Protecting Head office and WAN Link 55
4.1.4. Scenario 4: Transparent Firewall 55
4.1.5. Virtualization: CISCO IOS Firewall URL Filtering 55
4.2 Firewall Maintenance 56
4.2.1 Keeping the Firewall in Tune 56
4.2.2 System Monitoring 57
4.2.2.1 Monitoring the Unmonitored Threats 58
4.2.3 Preventing and Curative Maintenance 58
4.2.3.1 Preventing Security Breaches 60
4.2.3.2 Security Holes Identification 60
4.2.4 Firewall Recycling 61
CHAPTER FIVE: Summary, Conclusion and Recommendation 62
5.0 Summary 62
5.1 Conclusion About the Research Problem 62
5.2 Limitations 63
5.3 conclusion 63
5.4 recommendation for Further Research 63
References 64
LIST OF FIGURE
FIGURE TITLE PAGE
2.1 Circuit level gateway 19
2.2 Application level gateway 20
2.3 Packet filtering firewall 21
Abstract
The aim of this project is to investigate the use of firewalls in the internet security, and how designers and organization can ensure that this security mechanism is effective and efficient in practice.
It is no doubt that the advent of the internet was remarkable breakthrough since the advent of computer, but much attention has not been paid to its security until recent time and the use of firewalls most especially has put many insecurity cases to rest.
A review of the literature of security design and the use of firewalls in security reveals and implementing a firewall that can guarantee the utmost trust expected by end users.
The CISCO system IOS deployments scenario gives us a platform to analyze firewall for more understanding. Moreover, a well-developed and implemented firewall has not achieves the desired purpose if it is not properly maintained.
Please Note:
We represent an esteemed online resource center duly registered with the Corporate Affairs Commission (CAC). Our commitment to integrity and reliability underscores our ethos, ensuring that our services are delivered with utmost trustworthiness. It is our solemn assurance that we conduct our operations with the highest ethical standards, thereby precluding any possibility of deception or fraudulent activities. Guided by our reverence for ethical conduct, we pledge to uphold the principles of honesty and transparency in all our dealings. Rest assured, upon confirmation of your payment, our dedicated team endeavors to promptly furnish you with the requisite project materials within a timeframe of 30 minutes.
We further emphasize that the materials provided are intended for reference purposes, and it is incumbent upon the buyer to adapt and tailor the content to meet their specific requirements. It is imperative to exercise due diligence in ensuring that any utilization of the project or research content is in accordance with academic integrity standards, thus mitigating the risk of plagiarism
Projects are sent in MS word format within 30 minutes - 60 minutes of payment confirmation. For questions and complaints call or WhatsApp: +2348062235854 or +2348166784138
NOTE: By ordering for this material, you have read and agreed with our Terms of use
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
Feature Project Topics
-
IMPACT OF MOTOR CAR PARK LOCATION ON RENTAL VALUE IN IJEBU-NORTH LOCAL GOVERNMENT AREA
Transport Management69
12,910
5
-
EFFECTS OF COOPERATIVE LEARNING APPROACH ON ACADEMIC ACHIEVEMENT IN SECONDARY SCHOOL CHEMISTRY: A META-ANALYSIS OF FINDINGS
Education64
13,430
5
-
MICROBIOLOGICAL, PHYSICAL AND CHEMICAL PARAMETERS OF HAND DUG WELL LOCATED CLOSE TO A SEPTIC TANK IN IJEBU, OGUN STATE
Microbiology38
8,556
5
-
BACTERIA INFECTIONS: CAUSES, PREVENTION AND CONTROL
Microbiology Seminar52
12,481
4
-
A REVIEW ON THE USES OF MOBILE AGENT TECHNOLOGY ON MAINTAINING COMMUNICATION NETWORK
Computer Science49
10,122
5