FIREWALL

 

HomeDefinitionHistoryDesignSWOT-AnalysisApplicationsLinks

 

[Definition
[History
[Design
[SWOT-Analysis
[Applications] 
[Links] 

 

APPLICATION


Personal PCs: 

     Firewalls in personal computing can be designed as a multi layered shield that protects vulnerable areas of a computer.  Vulnerable areas are an operating system, applications content stored on a PC, and a network connection.  There are several types of personal firewall software packages are  BlackICE, CheckIT, ConSeal, Deerfield, eSafe Desktop, eTrust EZ, Firekeys, Freedom, GuardWall. HackTracer, Internet Firewall 2000, Kaspersky, Kerio, Look'n'Stop, McAfee, Mindsoft, NeoWatch, Norman, Norton, Outpost, pcInternet Patrol, PC Viper, Preventon, Privacyware, SecureUp, SurfSecret, Sphinx, Sygate, TermiNet, TGB:BOB, Tiny, VirusMD, VisNetic, Webroot & ZoneAlarm.  Without utilizing some form of Internet security on a computer it is possible for a perpetrator to enter into a foreign computer and retrieve critical. Information about an idividuals acccounts, credit card numbers or any other information that is stored on that PC as long as it is connected to an Internet.

 img1.gif

Small to Medium Business Applications:

     Although the Internet and the computer have been a boon to small businesses, this progress has not come without a price. Computer hacking, viruses and spamming have become ordinary, everyday business events. And according to Sandra Johnigan, a Dallas CPA and chairperson of the AICPA’s litigation and dispute resolution subcommittee, small businesses are particularly at risk of computer-
facilitated crimes. “Moreover, there is a growing trend of employees’ using the company’s computer to run their own businesses,” Johnigan observed. She said that dishonest employees also might steal their employers’ technology, customer lists or other business secrets in order to set up a competing enterprise. CPAs should advise their clients to take adequate security measures to protect the company’s secrets, including ensuring that sensitive documents are shredded or otherwise rendered unreadable before they are discarded.

     
With limited personnel, small businesses frequently must compromise on the division of responsibilities. Nonetheless, to keep employees on the straight and narrow, managers should attempt to assign separate workers to the functions of data entry and asset control. In the simplest terms, an employee who controls records should not control assets and vice versa. Johnigan said that conducting business on the Internet usually is a safe proposition when accompanied by a few basic security procedures. Last year, the White House released a draft report for small business to be mindful of cyber security and to consider five simple steps to reduce risks of fraud.

       Use a tough password of at least eight digits, with a mix of numerals and uppercase and
          lowercase letters.
      
 Maintain an updated virus protection program.
      
 Install update “patches” (that is, check software company Web sites for improvements to
          existing security).

      
 Use filtering techniques.
      
  Use firewalls in computers that have “always on” broadband connections.

http://www.aicpa.org/pubs/jofa/mar2003/wells.htm

     In small and medium businesses a firewall operates similarly to that of a personal computer by enforcing an access control policy between two networks also It blocks traffic and it permits traffic. One application that can be vital to a business is how well firewall hardware or software can be configured to permit only e-mail traffic to pass, or it can provide less stringent protection, blocking services that are known to be problems. In small businesses the need is to protect sensitive data and corporate resources from intrusion from outsiders.  If an intruder is able to gather sensitive knowledge it may undermine a businesses competitive advantage by compromising new product developments or client base.
 

Large Corporations Applications:

     For larger corporation and the applications of firewalls it is critical that the application is designed to support multiple networks and more complex systems. Firewalls in larger corporations must provide a higher level of security than that of a personal PC or a small business application, because larger corporations have more to protect in terms of money, resources, and research and development.     
 


Copyright(c) 2003 University of Saeed Carolina. All rights reserved.