THE USE OF FIREWALL IN INTERNET SECURITY

THE USE OF FIREWALL IN INTERNET SECURITY

Project Details

THE USE OF FIREWALL IN INTERNET SECURITY



Contact Chris Research

Description

The aim of this project is to investigate the use of firewalls in the internet security, and how designers and organization can ensure that this security mechanism is effective and efficient in practice. It is no doubt that the advent of the internet was remarkable breakthrough since the advent of computer, but much attention has not been paid to its security until recent time and the use of firewalls most especially has put many insecurity cases to rest. A review of the literature of security design and the use of firewalls in security reveals and implementing a firewall that can guarantee the utmost trust expected by end users. The CISCO system IOS deployments scenario gives us a platform to analyze firewall for more understanding. Moreover, a well-developed and implemented firewall has not achieves the desired purpose if it is not properly maintained.
TABLE OF CONTENT
CHAPTER ONE
1.0 Introduction
1.1 Statement of Problem
1.2 Method of Analysis
1.3 Method of Analysis
1.4 Organization of the Study
1.5 Explanation of terms
1.5.1 Network threats
1.5.2 Network protection
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction
2.1 Background
2.1.1 Network Security
2.2.2 Network History
2.2 Definitions
2.2.1 Stakeholders
2.2.1.1 Participation in system design
2.2.1.2 Information and computer security
2.3 Introduction to firewall
2.3.1 What are Firewalls?
2.3.2 The Purpose of Firewall
2.3.2.1 The Firewall Role of Protection
2.3.2.2 Firewalls Access Control
2.3.3 The Security Roles of a Firewall
2.3.4 Promoting Privates with Firewall
2.3.5 Advantage and Disadvantages of firewall
2.4 Firewall Components
2.4.1 Network Security Policy
2.4.2 Packet Filtering
2.5 Procuring a Firewall
2.5.1 Assessment
2.5.2 Buying a Firewall
2.5.3 Building a Firewall
2.5.4 Setting it up
CHAPTER THREE
3.1 Introduction
3.1 Categories of Firewall
3.1.1 Packet Filters
3.1.1.1 Weakness of Packet Filtering Firewalls.
3.1.2 Application-Level Firewalls
3.1.2.1 Advantages of Application Level Firewalls
3.1.3 Hybrid Firewalls
3.1.3.1 Weakness of Hybrid Firewalls
3.1.4. Second Generation Application Level Firewall
3.1.4.1 Advantages of second generation application level firewalls
3.2 Selection of Firewalls
3.3 Security Policy Consideration
3.3.1 Physical Consideration
3.3.2 Access Control Consideration
3.3.3 Authentication Consideration
3.3.4 Encryption Consideration
3.3.5 Security Auditing
3.3.6 Training Consideration
3.4 Responding to a Network Attack
3.4.1 How to deal with an Incident
3.4.2 To do List in Case of Incident
3.5 Persecuting the Hacker: the Position of the Legal system
3.5.1 Reasons for legal security and protection
3.5.2 Global Trend on Legal Security
3.5.3 The Nigerian approach
3.5.4 Protecting your Corporate Site
3.5.5 Preventing Break-ins at your Site
3.6 Setting up a Security Policy
CHAPTER FOUR
4.0 Analysis of Design
4.1 CISCO IOS Firewall Deployment Scenarios
4.1.1 Scenario 1: Protect Internet Connection at Remote Site (“Split Tunneling”)
4.1.2 Scenario 2: Protecting Servers at Remote Site
4.1.3 Scenario 3: Protecting Head office and WAN Link
4.1.4. Scenario 4: Transparent Firewall
4.1.5. Virtualization: CISCO IOS Firewall URL Filtering
4.2 Firewall Maintenance
4.2.1 Keeping the Firewall in Tune
4.2.2 System Monitoring
4.2.2.1 Monitoring the Unmonitored Threats
4.2.3 Preventing and Curative Maintenance
4.2.3.1 Preventing Security Breaches
4.2.3.2 Security holes identification
4.2.4 Firewall Recycling
CHAPTER FIVE
5.0 Summary
5.1 Conclusion about the Research Problem
5.2 Limitations
5.3 Conclusions
5.4 Recommendation for Further Research
References

Leave a Reply

Your email address will not be published. Required fields are marked *