Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2011, asfdgad agasfas
…
4 pages
1 file
fasf asfasf asfasfa safasf
This project is dedicated to the memory of my mother, Linda Lockhart Rogers Freeman . Regardless of how difficult her life was, she always made time for her son and made his education her top priority. She will always be loved, remembered, and dearly missed.
Proceedings of the 13th International Conference on Web Information Systems and Technologies, 2017
Computers systems are virtually in every area of our life, but their use has several risks. This is particularly relevant for small business that are beginning to resort in informatics systems for all their activities, and where a breach of security can have catastrophic consequences. Most risks or security vulnerabilities, besides inadverted errors, originates from criminal activity, which anonymously thrives on the Web and can outbreak any organization, mainly for profit but sometimes just for the challenge of doing it. Consequently, creating and managing a security system is often the main form of precaution and it is the solution that guarantees better success rates. In this paper, we are interested in software with a lower financial cost, therefore our focus is in Free and Open Source Software. To this end, the following types of security tools are analyzed: Firewall and Web Applications Firewall (WAF).
ACM Transactions on Computer Systems, 2004
In recent years packet-filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security management technology is lacking. In this paper we present Firmato, a firewall management toolkit, with the following distinguishing properties and components: (1) an entity-relationship model containing, in a unified form, global knowledge of the security
Asian Journal of Research in Computer Science, 2021
Firewalls are a fundamental element of network security systems with the ability to block network data traffic flows according to predefined rules. They work on the main purpose to prevent the spread of any deleterious event both on the host as well as network side from any intrusion. Conventional firewalls rely on functions specified by a sequence of rules, which often conflict. Also, various forms of tunnels, wireless and dial-up access methods allow individuals to bypass all the security mechanisms provided by the traditional firewall. Thus, in this paper we discuss the uses and classification of both host and network-based firewalls, other firewall approaches to overcome the cons of traditional firewalls, various firewall policies, including some anomalies.
2019
Information and excitement for computer system security is developing day by day along with its requirement. The interest is no uncertainty, due to the advancements with the extension of web services and due to the extension in the quantity of organizations that usually placing their deals and data channels on the internet or web. Web security has turned into a noteworthy issue in the present pattern of things. And it’s like an evil which whenever left to spread will in a matter of seconds have consequences for every one of us. This paper hence analyzes web security with a glance at firewall and how it can help secure the system and web. A firewall is a piece of a computer or network system that is configured to prevent communication from unauthorized sources whereas allowing access from authorized sources. The techniques and kinds of firewalls are additionally talked about. The paper further examines firewall and how it can help in web security, business security and individual sys...
2006
The Web Application can easily be attacked by the hackers eventhough with the existence of the normal firewall in the system. This is due to the limitation that the normal firewall does not work in the application layer. The hackers will attack the Web Application using the methods like Structured Query Language (SQL) Injection, Cross Site Scripting (XSS), Command Injection, or Session Manipulation as the normal firewall only open port 80 for Internet connection. Most of the Web Application Firewall is quite costly. There are only few that can be operated under free license. The usage of ModSecurity can solve the problem as it can be downloaded under GNU license. This thesis is attempted to show the benefits of implementing ModSecurity and also the reverse proxy server, instead of just implementing the conventional web server. The penetration test is done to evaluate the performance of the server using this Web Application Firewall. The results showed that ModSecurity and the Revers...
2000
Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In addition, inserting or modifying a filtering rule requires thorough analysis of the relationship between this rule and other rules in order
2008
ABSTRACT Security concerns in computer networks resulted in a remarkable proliferation of network firewalls. However, the mere presence of more firewalls in the network is not a guarantee of more secure networks. The average expertise of today's firewall administrator is probably lower than it was a few years ago, resulting in an increased possibility of faulty installations, poor configuration and ineffective monitoring. This scenario calls for safer and more cost-efficient procedures for firewall deployment and maintenance.
International Journal of Information Security, 2006
Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations are important components of every corporation's network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages, using vendorspecific GUIs. A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that allows them to analyze the policy on a firewall.
DePaul University, CTI, Tech. Rep, 2002
Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In ...
Archives of Clinical Neuropsychology, 2007
Revista Espanola De Linguistica Aplicada, 2007
Oltreoceano, 2015
Geophysical Journal International, 2012
International Journal of Computer Trends and Technology, 2025
The Journal of Open Source Software, 2017
Indian Journal of Science and Technology, 2023
Journal of Comparative Economics, 1994
Simpósio de Alimentos e Nutrição, 2017
Jurnal Teknologi, 2016
مبادرة الإصلاح العربي, 2024