FIREWALL |
|
|
|
APPLICATIONPersonal PCs: Firewalls in personal computing can be designed as a multi layered shield that protects vulnerable areas of a computer. Vulnerable areas are an operating system, applications content stored on a PC, and a network connection. There are several types of personal firewall software packages are BlackICE, CheckIT, ConSeal, Deerfield, eSafe Desktop, eTrust EZ, Firekeys, Freedom, GuardWall. HackTracer, Internet Firewall 2000, Kaspersky, Kerio, Look'n'Stop, McAfee, Mindsoft, NeoWatch, Norman, Norton, Outpost, pcInternet Patrol, PC Viper, Preventon, Privacyware, SecureUp, SurfSecret, Sphinx, Sygate, TermiNet, TGB:BOB, Tiny, VirusMD, VisNetic, Webroot & ZoneAlarm. Without utilizing some form of Internet security on a computer it is possible for a perpetrator to enter into a foreign computer and retrieve critical. Information about an idividuals acccounts, credit card numbers or any other information that is stored on that PC as long as it is connected to an Internet.
Small to Medium Business Applications: Although the Internet and the computer have been a boon to small
businesses, this progress has not come without a price. Computer hacking,
viruses and spamming have become ordinary, everyday business events. And
according to Sandra Johnigan, a Dallas CPA and chairperson of the AICPA’s
litigation and dispute resolution subcommittee, small businesses are
particularly at risk of computer-
Use a tough password of
at least eight digits, with a mix of numerals and uppercase and http://www.aicpa.org/pubs/jofa/mar2003/wells.htm In small and medium
businesses a firewall operates similarly to that of a personal computer by
enforcing an access control policy between two networks also It blocks traffic
and it permits traffic. One application that can be vital to a business is how
well firewall hardware or software can be configured to permit only e-mail
traffic to pass, or it can provide less stringent protection, blocking services
that are known to be problems. In small businesses the need is to protect
sensitive data and corporate resources from intrusion from outsiders. If an intruder is able to gather sensitive
knowledge it may undermine a businesses competitive advantage by compromising
new product developments or client base. Large
Corporations Applications: For larger corporation
and the applications of firewalls it is critical that the application is
designed to support multiple networks and more complex systems. Firewalls in
larger corporations must provide a higher level of security than that of a
personal PC or a small business application, because larger corporations have
more to protect in terms of money, resources, and research and
development. |
Copyright(c) 2003 University
of Saeed Carolina. All rights reserved. |