[go: up one dir, main page]

Broderick, 2005 - Google Patents

Firewalls–Are they enough protection for current networks?

Broderick, 2005

View PDF
Document ID
3718191489040892344
Author
Broderick J
Publication year
Publication venue
Information Security Technical Report

External Links

Snippet

Firewalls are widely deployed in most organizations connected to the Internet to implement their information security policy and to protect information from unauthorized access. Yet intruders still manage to attack systems and gain unauthorized access to information that is …
Continue reading at faculty.kfupm.edu.sa (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Beale et al. Wireshark & Ethereal network protocol analyzer toolkit
US8640237B2 (en) Integrated firewall, IPS, and virus scanner system and method
Frahim et al. Cisco ASA: all-in-one firewall, IPS, and VPN adaptive security appliance
Noonan et al. Firewall fundamentals
Lodin et al. Firewalls fend off invasions from the net
Deal Cisco router firewall security
Frahim et al. Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services
Santos et al. Cisco next-generation security solutions: All-in-one cisco ASA firepower services, NGIPS, and AMP
Dees et al. Enhancing infrastructure security in real estate
de Hoz Diego et al. CMXsafe: A proxy layer for securing internet-of-things communications
Broderick Firewalls–Are they enough protection for current networks?
Vachon CCNA security portable command guide
Brooks CLOUD TO EDGEWARE: Wireless Grid Applications, Architecture and Security for the Internet of Things
Cameron et al. Configuring Juniper Networks NetScreen and SSG Firewalls
Frahim et al. Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
Flynn Designing and building enterprise DMZs
Cameron et al. Juniper (r) Networks Secure Access SSL VPN Configuration Guide
Rao et al. Understanding networks and network security
Maurya et al. Changing Trend in Network Security Measures: A Review
Devarasetty Zscaler Cloud Security Essentials
Yeo Personal firewalls for administrators and remote users
Gibson CISSP Rapid Review
Moraes Cisco Firewalls: Concepts, Design and Deployment for Cisco Stateful Firewall Solutions
Bendell Configuring SonicWALL Firewalls
Mlodzianowski et al. CCNP and CCIE Security Core SCOR 350-701 Exam Cram