Firewall Technologies

Author(s):  
Cristinel Marius VASILE

Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.

1990 ◽  
Vol 5 (2) ◽  
pp. 63-72 ◽  
Author(s):  
Rodger Jamieson ◽  
Graham Low

This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and concerns highlighted. Controls and security measures are proposed as guidelines to counter these threats. An approach to the audit of each major area of network operations is proposed. This suggested framework provides guidance to information system security officers, auditors, communications and network administrators, consultants and information systems management for the review of local area network security during network operations.


Author(s):  
CHRISTINE STRAUSS ◽  
CHRISTIAN STUMMER

Security issues in information management are increasingly moving towards the centre of corporate interests. This paper presents a multiobjective modelling approach that interactively assists IT managers in their attempts to reduce a given risk by evaluating and selecting portfolios (i.e. bundles) of security measures. The proposed multi-step procedure identifies attractive portfolio candidates and finally establishes the "best" one with respect to the decision-maker's preferences. Our model and its possible application are demonstrated by means of a numerical example based on real-world data that evaluates the risk of hacking faced by a Local Area Network in an academic environment.


Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2008 ◽  
pp. 1349-1360
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


2021 ◽  
Vol 289 ◽  
pp. 03005
Author(s):  
Daria A. Gaskova ◽  
Aleksei G. Massel

The paper considers the violation of cybersecurity as a possibility of a real impact (intentional or accidental) from cyberspace on the physical infrastructure of a digital energy facility. In energy security studies, such impacts are considered as extreme situations, including critical and emergency situations. A model of scenarios of extreme situations in the energy sector caused by cyber threats using Bayesian Belief Network and the stages of modeling are considered in more detail. The five main stages are i) modeling cyber threats vectors of intrusion and advance towards the target asset; ii) modeling an attack on a target system in the technological segment of the local area network; iii) modeling technogenic threats to energy security caused by cyber threats; iv) modeling consequences at the level of the facility system; v) modeling consequences at the level of the infrastructure. This approach allows one to build cause and effect relationships from vulnerabilities in the cyber environment to the consequences. Modeling stages are aimed at increasing the level of cyber situational awareness, which, in turn, related with energy security issues.


2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


Author(s):  
Osman Goni

A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.


10.28945/2491 ◽  
2002 ◽  
Author(s):  
Kaj J. Grahn ◽  
Göran Pulkkis ◽  
Jean-Sebastien Guillard

This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.


Author(s):  
Kannan Balasubramanian

As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.


Sign in / Sign up

Export Citation Format

Share Document