Thursday, May 2, 2019

Firewall and Internet security Dissertation Example | Topics and Well Written Essays - 2250 words

Firewall and Internet security - Dissertation ExampleThe advancements in engineering have almost pulled every individual on earth into the virtual world of cyber pace.As every day passes by, the rapidity with which internet grows has increased exponentially and the world is shrivel up smaller and smaller. People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each new(prenominal). The distance is no more a bet of concern. Despite all the advantages of a meshworked world, the parallel increase in cyber threats has been an alarming doer. Information is the key to supremacy of any individual or organization. When there is a threat to the security of such an important factor and the manner in which interneted computers are hacked within seconds of time has put cyber security as one of the straighten out priorities for technology developers. With the advent of these issues, the installation of firewall s has become a mandatory activity for every internet user. either time a new level of security is proposed, a new mode of threat is unearthed in this virtual world. So, as a precautionary measure, people protect themselves with having both ad hominem as soundly as network firewalls. Although many kinds of research has been done on the levels of protection offered by network firewalls and own(prenominal) firewalls, not much has been done on the perspective of providing a comparison between these two types of firewalls. (CHESWICK et. al, 2003) proceed on these lines, the primary aim of this research is to examine the current literature comprehensively and produce a compare and contrast summary of these two types of firewalls in regard to the increase in todays internet security. However, since the sept of this itself provides a large scope for a complex and more time consuming analysis, the research interrogatory is further refined such that it focuses mainly on the following topic - why implementation of personal firewalls in every system in an enterprisingness is considered to be a difficulty when compared to the implementation of network firewalls. The reason that could be given for the choice of this topic is that irrespective of the number of advancements in firewall technologies, no proper solutions have been found yet, to understand the continued ignorance of affording personal firewalls to every system user in an enterprise instead of network firewalls, which are always considered as the preferred option. (Firewalls, 2003) Objectives of the research Based on the preceding(prenominal) research questions, the primary objectives of the research can be derived. The most common inconsistencys between personal and network firewalls (which are explained in the literature review section) are the architecture and design features, the working environment, technical features and other advantages and disadvantages of each type of firewall. Implementing a personal firewall seems to be a tougher task, as the configuration might not be similar for every system. This makes the process of implementation a difficult task. Each time a firewall is implemented the system components and modules pose certain restrictions that in turn make the process tedious. The situation is in all different in a network environment. Since the implementation is done on the network as a whole, the task of installing them in individual system is eradicated. In a network environment, the firewall controls the communication and network traffic. As the functions of a network firewall are composed of easier installation management process, it strikes a greater difference from that of a personal firewall. The disadvantage of a personal firewall strengthens the research question, as it indicates the importance of network firewalls. Hence, the analysis of the areas which were described above is considered to be the primary objectives of the research. Literature Rev iew The progress of internet and development of technology has necessitated the need for

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.