$19.95 Buy and instantly download this paper now
This paper examines the role of firewalls in protecting computers against various threats and vulnerabilities, which are usually in the form of computer viruses. These viruses, which can compromise a computer system's privacy and ability to function, are described at length. Then, the paper lists the ways in which firewalls act as the first line of defense to the information system, protecting its integrity. The role of rulesets and the use of firewalls with both hardware and software are discussed. Various sub-types of firewalls, which include network layer firewalls, application layer firewalls proxy firewalls are also defined. The paper concludes by stating that the choice of which firewall to implement will depend on the outcome of the needs analysis on the computing environment.
From the Paper:"In a networked environment, the firewall stands guard at the very front. It actually provides the first line of defense to the information system. Think about a building and there is a security guard manning the entrance. The guard validates people coming in (or even going out) to see if they are allowed access into the place. Allowing entry or not is not a simple act but based on a set of rules or policies formulated by the building owner. By the same token, the firewall does likewise in the protection of the computing environment especially the network."
Sample of Sources Used:
- Barbish, Joseph J. "Firewalls." The FreeBSD Handbook. 2008. 04 November 2008. <http://www.freebsd.org/doc/en/books/handbook/firewalls.html>.
- Partsenidis, Chris. Introduction to Firewalls. 02 January 2008. 04 November 2008. <http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1282044,00.html
Cite this Term Paper:
Firewalls (2010, October 24) Retrieved August 10, 2022, from https://www.academon.com/term-paper/firewalls-145044/
"Firewalls" 24 October 2010. Web. 10 August. 2022. <https://www.academon.com/term-paper/firewalls-145044/>