Preview

Data Security

Good Essays
Open Document
Open Document
1962 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security
DATA SECURITY IN LOCAL NETWORK USING DISTRIBUTED FIREWALLS

ABSTRACT

Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls. A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language, a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain. Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization.They provide virtually unlimited scalability. In addition, they overcome the singlepoint-of-failure problem presented by the perimeter firewall. In our paper we deal with distributed firewall concepts, its evolution, its components, policies and a sample of the designed policy along with implementation. A distributed firewall gives complete security to the network.
1.Introduction : Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion.

You May Also Find These Documents Helpful

  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    1. A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps?…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    5) Firewall: A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IDS are often considered as the functionality of firewall. But there is a thin line of difference between them. A firewall must be regarded as a fence that protects the information flow and prevent intrusions where as IDS detects if the network is under attack or if the security enforced by the firewall has been breached. Together firewall and IDS enhance the security of network.…

    • 1131 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    HP S Intrusion Prevention System (IPS) N Series Data sheet Product overview The HP S Intrusion Prevention System (IPS) N Series achieves a new level of inline, real-time protection, providing proactive network security for today's and tomorrow's real-world network traffic and data centers. The IPS platform's next-generation architecture adds significant capacity for deep packet traffic inspection, and its modular software design enables the addition of valuable network protection services to its proven intrusion prevention solution. This new industry-leading IPS platform redefines intrusion prevention as a foundation for comprehensive network security.…

    • 3933 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    The message authentication code is calculated by the sender and the receiver of a data transmission.…

    • 3404 Words
    • 14 Pages
    Better Essays