THE USE OF FIREWALL IN INTERNET SECURITY

THE USE OF FIREWALL IN INTERNET SECURITY

Project Details

THE USE OF FIREWALL IN INTERNET SECURITY



Contact Chris Research

Description

ABSTRACT
The aim of this project is to investigate the use of firewalls in the internet security, and how designers and organization can ensure that this security mechanism is effective and efficient in practice.
It is no doubt that the advent of the internet was remarkable breakthrough since the advent of computer, but much attention has not been paid to its security until recent time and the use of firewalls most especially has put many insecurity cases to rest.
A review of the literature of security design and the use of firewalls in security reveals and implementing a firewall that can guarantee the utmost trust expected by end users.
The CISCO system IOS deployments scenario gives us a platform to analyze firewall for more understanding. Moreover, a well-developed and implemented firewall has not achieves the desired purpose if it is not properly maintained.


TABLE OF CONTENTS
Chapter One: Introduction
1.1 Background to the Study
1.2 Statement of the Problem
1.3 Aim and Objectives of the Study
1.4 Methodology
1.5 Scope of the Study
1.6 Source of Data
1.7 Operational Definition of Terms
1.7.1 Network Threats
1.7.2 Network Protection
1.8 Organization of the Study
Chapter Two Literature Review
2.0 Introduction
2.1 History of Computer Security
2.2 Network Security
2.3 Threat to Network Security
2.4 Firewall
2.4.1 Working of Firewall Management
2.4.2 Other Types of Firewalls
2.4.3 Firewall Limitation
CHAPTER THREE: Firewall Design and Implementation
3.1 Introduction
3.1 Categories of Firewall
3.1.1 Packet Filters
3.1.1.1 Weakness of Packet Filtering Firewalls.
3.1.1 Application-level Firewalls
3.1.2.1 Advantages of Application Level Firewalls
3.13 Hybrid Firewalls
3.1.3.1 Weakness of Hybrid Firewalls
3.1.4. Second Generation Application Level Firewall
3.1.4.1 Advantages of Second Generation Application level Firewalls
3.2 Selection of Firewalls
3.3 Security Policy Considerations
3.3.1 Physical Considerations
3.3.2 Access Control Consideration
3.3.3 Authentication Consideration
3.3.4 Encryption Consideration
3.3.5 Security Auditing
3.3.6 Training Consideration
3.4 Responding to a Network Attack
3.4.1 How to Deal with an Incident
3.5.1 To do List in Case of Incident
3.5.1 Reasons for Legal Security and Protection
3.5.2 Global Trend on Legal Security
3.5.3 The Nigerian Approach
3.5.4 Protecting your Corporate Site
3.5.5 Preventing Break-ins at your site
3.6 Setting Up a Security Policy
CHAPTER FOUR: Analysis of Design and Firewall Maintenance
4.0 Analysis of Design
4.1 CISCO IOS Firewall Deployment Scenarios
4.1.1 Scenario 1: Protect Internet Connection at Remote Site (“Split Tunneling”)
4.1.2 Scenario 2: Protecting Servers at Remote Site
4.1.3 Scenario 3: Protecting Head office and WAN Link
4.1.4. Scenario 4: Transparent Firewall
4.1.5. Virtualization: CISCO IOS Firewall URL Filtering
4.2 Firewall Maintenance
4.2.1 Keeping the Firewall in Tune
4.2.2 System Monitoring
4.2.2.1 Monitoring the Unmonitored Threats
4.2.3 Preventing and Curative Maintenance
4.2.3.1 Preventing Security Breaches
4.2.3.2 Security Holes Identification
4.2.4 Firewall Recycling
CHAPTER FIVE: Summary, Conclusion and Recommendation
5.0 Summary
5.1 Conclusion About the Research Problem
5.2 Limitations
5.3 conclusion
5.4 recommendation for Further Research
References

Leave a Reply

Your email address will not be published. Required fields are marked *