Study of History and Type of Firewall
Keywords:
Protecting, firewallAbstract
A firewall may block any harmful data from entering your network. Using a predetermined set of rules, firewalls prevent malicious traffic from entering a network. Users inside the network might be blocked from accessing specific resources by implementing these policies. The basic premise behind firewalls is that data travelling across networks from less secure locations should be verified and reviewed before being allowed access to more secure locations. In this way, access to a restricted area of a network can be denied to unwanted individuals, machines, and programmes. Without firewalls, hackers may easily get access to your network and use its computers and devices to launch attacks.
References
Wojciech Konikiewicz & Marcin Markowski (2017), Analysis of Performance and Efficiency of Hardware and Software Firewalls, Vol. 9, No. 1, pp. 49
Richa Sharma & Chandresh Parekh (2017), A Study and Its Classification, Volume 8, No. 4, May – June 2017
Xin Yue, Wei Chen, Yantao Wang (2009). The research of firewall technology in computer network security. DOI:10.1109/PACIIA.2009.5406566
Miss. Shwetambari G. Pundkar & Prof. Dr. G. R. Bamnote (2014), Analysis of firewall technology in computer network technology in computer network security, Vol.3 Issue.4, April- 2014, pg. 841-846
Steven Thomason (2012), Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices, Volume 12 Issue 13 Version 1.0 Year 2012
RahatAfreen, S.C. Mehrotra, (2011). A Review on Elliptic Curve Cryptography for Embedded Systems. International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011, Pp 84-103.
Srivaths Ravi, AnandRaghunathan, Paul Kocher, Sunil Hattangady, (2004). Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing SystemsVolume 3Issue 3August 2004 pp 461–491https://doi.org/10.1145/1015047.1015049.
Junfeng Fan; LejlaBatina; Ingrid Verbauwhede (2009). Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.