Monday, April 29, 2019
Modern Day Attacks Against Firewalls and VPNs Essay
Modern Day Attacks Against Firewalls and VPNs - Essay illustrationVPN is an important technological advancement for remote workers as well as organizations to sh be the data in privately. The security issues surrounding VPNs are cracking of offline password, deficiency of account lock out, poor default organization and VPN thumbprint among others (Hills, 2005). In the similar context, firewalls are the security arranging used as secure the flow of information between the both ne 2rks. Firewalls places a bottleneck between the communicates which ensures the privacy and confidentiality of the data shared between the two networks. There are two types of firewalls such as packet filtering firewall and stateful inspection firewall. The common threats pertaining to firewalls include attacks from malicious codes such as virus, worms and information theft among others (Rao et al., 2011). This paper intends to explain the modern daytime attacks against firewalls and VPNs by explaining co ncepts of these two information technology tools. In the light of aforesaid description, the essay intends to explain and discuss modern day attacks against firewalls and VPNs.The technology of firewalls was first established in 1980 and since then it has undergone several modifications and alternations. Firewalls are integrated security system designed to secure network from unauthorized access. Firewalls are also useful for protecting the outside fire. Firewalls are also considered as a system of network security which controls flow of traffic over the network created by set of protocols (Brown University, n. d.). Firewalls as act as a software solution and hardware restroom. Firewalls can also be defined as the security measures, which protect local system as well as network system from the potential threats. The two types of firewalls are packet filtering and stateful inspection firewall. A packet filtering firewalls allows the flow of packets that meets certain specific criter ia. The rules of the filtering depend on
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.