Monday, September 9, 2019
Modern Day Attacks Against Firewalls and VPNs Essay
Modern Day Attacks Against Firewalls and VPNs - Essay Example VPN is an important technological advancement for remote workers as well as organizations to share the data in privately. The security issues surrounding VPNs are cracking of offline password, deficiency of account lock out, poor default formation and VPN thumbprint among others (Hills, 2005). In the similar context, firewalls are the security system used as secure the flow of information between the two networks. Firewalls places a bottleneck between the networks which ensures the privacy and confidentiality of the data shared between the two networks. There are two types of firewalls such as ââ¬Ëpacket filtering firewallââ¬â¢ and ââ¬Ëstateful inspection firewallââ¬â¢. The common threats pertaining to firewalls include attacks from malicious codes such as virus, worms and information theft among others (Rao et al., 2011). This paper intends to explain the modern day attacks against firewalls and VPNs by explaining concepts of these two information technology tools. In th e light of aforesaid description, the essay intends to explain and discuss modern day attacks against firewalls and VPNs. The technology of firewalls was first established in 1980 and since then it has undergone several modifications and alternations. Firewalls are integrated security system designed to secure network from unauthorized access. Firewalls are also useful for protecting the outside fire. Firewalls are also considered as a system of network security which controls flow of traffic over the network created by set of protocols (Brown University, n. d.). Firewalls as act as a ââ¬Ësoftware solutionââ¬â¢ and ââ¬Ëhardware applianceââ¬â¢. Firewalls can also be defined as the security measures, which protect local system as well as network system from the potential threats. The two types of firewalls are packet filtering and stateful inspection firewall. A packet filtering firewalls allows the flow of packets that meets certain specific criteria. The rules of the filtering depend on
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.