Project Materials

COMPUTER ENGINEERING PROJECT TOPICS

DATA SECURITY USING FIREWALL

DATA SECURITY USING FIREWALL

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

DATA SECURITY USING FIREWALL

Chapter one

1.1 Introduction.

Computers and networking have become inextricably linked by now. A large number of confidential transactions occur every second, and computers are now mostly utilised for data transport rather than processing. It needs to include corrective actions made to make it easier to use, guard against viruses, prevent data hacking, and offer verified data transfers.

A firewall is a device or set of instruments designed to permit or deny network transmissions based on a set of rules and regulations. It is commonly used to protect networks from unauthorised access while allowing legitimate communications to pass or during sensitive data transmission.

It is a collection of components that are located between two networks and filter traffic between them using some security policies. A firewall can effectively protect a local system or network systems from network-based security risks while also providing access to the outside world via wide area networks and the internet (Bellovin, 2019).

Traditional firewalls (conventional firewalls) are devices that are often positioned on the network’s edge and operate as a bouncer, letting only particular sorts of traffic into and out of the network. They are also known as perimeter firewalls.

They divide the network in two parts: trusted on one side and untrusted on the other. As a result, they place a high value on network topology. Furthermore, firewalls serve as a policy control system, allowing a site administrator to specify external access policies. Just as file permissions impose an internal security policy, they can also enforce an exterior security policy.

Michael, (2011). Distributed firewalls are host-based security software solutions that safeguard the company network’s servers and end-user machines from unauthorised access.

They provide the advantage of filtering traffic from both the Internet and the internal network. This allows them to prevent hacking assaults coming from both the Internet and the internal network. This is significant since the most expensive and devastating attacks still come from within the organisation.

Centralised management is one of the features of distributed firewalls. The capacity to populate servers and end-user machines, as well as define and “push out” uniform security policies, helps to make the best use of limited resources.

The capacity to collect reports and manage updates centrally makes dispersed security feasible. Distributed firewalls can aid in two ways. Remote end-user computers can be safeguarded.

Second, they secure key network servers, preventing malicious code intrusion and “jailing” other similar code by preventing the protected server from being utilised as a launchpad for broader attacks (Gatus, 2014).

They are typically put behind the regular firewall and serve as a secondary layer of defence. They work by allowing just necessary traffic into the machine they safeguard while blocking all other forms of traffic to prevent unwanted intrusions.

Distributed firewalls work as specialists, whereas perimeter firewalls must take a generalist, common denominator approach to securing network hosts.

A firewall is a device or combination of instruments designed to allow or prohibit network transmissions depending on a set of rules and regulations. They are commonly used to protect networks from unauthorised access while allowing legitimate communications to pass or during sensitive data transmission.

Distributed firewalls enable the enforcement of security regulations on a network while not restricting its topology from the inside or outside. The use of a policy language and delegating its semantics to all members of the network domain facilitates the implementation of firewall technology for organisations in which network devices communicate over insecure channels while maintaining a logical separation of hosts within and outside the trusted domain.

Data security needs have changed significantly during the previous three decades. The first significant shift was the emergence of the computer. The need to protect files and information became clear.

Computer security refers to a collection of tools used to protect data and prevent hacker attacks. The second important shift was the advent of distributed systems, networks, and communication facilities for data transmission.

Data security procedures are required to safeguard data during transmission. The third change is the rapid evolution of wireless networks and mobile communications. Data security is thus a top priority today (Jayesh 2017).

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisements