To study the Risk or Issues of Firewall: Solution with different approach

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2011 by IJPTT Journal
Volume-1 Issue-3                           
Year of Publication : 2011
Authors : Hiral B.Patel, Ravi S.Patel, Amit V.Patel

Citation

Hiral B.Patel, Ravi S.Patel, Amit V.Patel."To study the Risk or Issues of Firewall: Solution with different approach". International Journal of P2P Network Trends and Technology (IJPTT), V1(3):36-39  Nov - Dec 2011, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Firewalls is very useful things for internet security problems for data transmission or other purpose but some times firewalls have some problems which are discussed in this research paper. Software firewalls that only block inwards traffic such as the Windows XP default firewall are useless at detecting programs on your system that are trying to communicate without your knowledge. Configuring a firewall can be difficult if you want maximum security and functionality. Software firewalls need to be enabled during the bootup process just after network connections enabled and disabled just before the network connection is closed. Vanilla Windows XP failed to do this, by not switched on its default firewall by default, and then only switched it on late in the bootup process. Some of us watched the ensuring virus infection disaster from safer sidelines. Some say you only need a hardware firewall. The problem is that few hardware firewalls will stop outward traffic from an unwanted program. Also they do not protect you if you bypass them via say a dial up modem when your broadband connection goes down. This is potentially particularly problematical if you have Windows file or printing sharing enabled as computers out there are testing all the time for this wonderful exploitable back door into a computer system.

References

[1]. Matt Curtin Introduction to Network Security March 1997
[2]. Book of Practical Unix & Internet Security, Chapter 21
[3].http://www.checkpoint.com/products/technology Check Point Software Technologies Ltd. Stateful Firewall Technology - Products and Solutions. 2000.
[4]. Oliver J Leahy Dermot M. Tynan J. Mark Smith, Sean G. Doherty. Firewall technology. Digital Technical Journal, (2), 1997.
[5]. Dan Nessett and Pola Humenn. Multilayer Firewall. 1999.
[6]. Yakomba Yavwa ,The Firewall Technology May 2, 2000
[7]. Habtamu Abie An Overview of Firewall Technologies1 January 2000
[8].http://www.ganfyd.org/index.php?title=Issues_with_Firewalls
[9].http://www.networkingFirewall, Firewalls, Interent Security, Corporate Firewall - Vicomsoft.htm

Keywords

Firewall Technologies, Network Security, Access Control, Security Policy, Protective Mechanisms.