Research Article | Open Access | Download PDF
Volume 1 | Issue 3 | Year 2011 | Article Id. IJPTT-V1I3P407 | DOI : https://doi.org/10.14445/22492615/IJPTT-V1I3P407To study the Risk or Issues of Firewall: Solution with different approach
Hiral B. Patel, Ravi S. Patel, Amit V. Patel
Citation :
Hiral B. Patel, Ravi S. Patel, Amit V. Patel, "To study the Risk or Issues of Firewall: Solution with different approach," International Journal of P2P Network Trends and Technology (IJPTT), vol. 1, no. 3, pp. 36-39, 2011. Crossref, https://doi.org/10.14445/22492615/ IJPTT-V1I3P407
Abstract
Firewalls is very useful things for internet
security problems for data transmission or other purpose but some times
firewalls have some problems which are discussed in this research paper.
Software firewalls that only block inwards traffic such as the Windows XP
default firewall are useless at detecting programs on your system that are
trying to communicate without your knowledge. Configuring a firewall can be
difficult if you want maximum security and functionality. Software firewalls
need to be enabled during the bootup process just after network connections
enabled and disabled just before the network connection is closed. Vanilla
Windows XP failed to do this, by not switched on its default firewall by
default, and then only switched it on late in the bootup process. Some of us
watched the ensuring virus infection disaster from safer sidelines. Some say
you only need a hardware firewall. The problem is that few hardware firewalls
will stop outward traffic from an unwanted program. Also they do not protect
you if you bypass them via say a dial up modem when your broadband connection
goes down. This is potentially particularly problematical if you have Windows
file or printing sharing enabled as computers out there are testing all the
time for this wonderful exploitable back door into a computer system.
Keywords
Firewall Technologies, Network Security, Access Control, Security Policy, Protective Mechanisms.
References
[1]. Matt Curtin Introduction to Network Security March 1997
[2]. Book of Practical Unix & Internet Security, Chapter 21
[3].http://www.checkpoint.com/products/technology Check Point Software Technologies Ltd. Stateful Firewall Technology - Products and Solutions. 2000.
[4]. Oliver J Leahy Dermot M. Tynan J. Mark Smith, Sean G. Doherty. Firewall technology. Digital Technical Journal, (2), 1997.
[5]. Dan Nessett and Pola Humenn. Multilayer Firewall. 1999.
[6]. Yakomba Yavwa ,The Firewall Technology May 2, 2000.
[7]. Habtamu Abie An Overview of Firewall Technologies1 January 2000
[8].http://www.ganfyd.org/index.php?title=Issues_with_Firewalls
[9].http://www.networkingFirewall, Firewalls, Interent Security, Corporate Firewall - Vicomsoft.htm