Study of History and Type of Firewall

Authors

  • Shalini

Keywords:

Protecting, firewall

Abstract

A firewall may block any harmful data from entering your network. Using a predetermined set of rules, firewalls prevent malicious traffic from entering a network. Users inside the network might be blocked from accessing specific resources by implementing these policies. The basic premise behind firewalls is that data travelling across networks from less secure locations should be verified and reviewed before being allowed access to more secure locations. In this way, access to a restricted area of a network can be denied to unwanted individuals, machines, and programmes. Without firewalls, hackers may easily get access to your network and use its computers and devices to launch attacks.

References

Wojciech Konikiewicz & Marcin Markowski (2017), Analysis of Performance and Efficiency of Hardware and Software Firewalls, Vol. 9, No. 1, pp. 49

Richa Sharma & Chandresh Parekh (2017), A Study and Its Classification, Volume 8, No. 4, May – June 2017

Xin Yue, Wei Chen, Yantao Wang (2009). The research of firewall technology in computer network security. DOI:10.1109/PACIIA.2009.5406566

Miss. Shwetambari G. Pundkar & Prof. Dr. G. R. Bamnote (2014), Analysis of firewall technology in computer network technology in computer network security, Vol.3 Issue.4, April- 2014, pg. 841-846

Steven Thomason (2012), Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices, Volume 12 Issue 13 Version 1.0 Year 2012

RahatAfreen, S.C. Mehrotra, (2011). A Review on Elliptic Curve Cryptography for Embedded Systems. International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011, Pp 84-103.

Srivaths Ravi, AnandRaghunathan, Paul Kocher, Sunil Hattangady, (2004). Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing SystemsVolume 3Issue 3August 2004 pp 461–491https://doi.org/10.1145/1015047.1015049.

Junfeng Fan; LejlaBatina; Ingrid Verbauwhede (2009). Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

Downloads

Published

2017-12-31

How to Cite

Shalini. (2017). Study of History and Type of Firewall. Innovative Research Thoughts, 3(11), 631–636. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/1258