Abstract
The rapid growth of the Internet has led to a corresponding growth of both users and activities in cyberspace. Unfortunately, not all these users and their activities are reputable; thus, the Internet has been increasingly, at least to many individuals and businesses, turning into a “bad Internet.” Bad people are plowing the Internet with evil activities that include, among other things, intrusion into company and individual systems looking for company data and individual information that erodes privacy and security. There has, therefore, been a need to protect company systems and now individual devices, keeping them from those “bad users” out on the “bad Internet.” As companies build private networks and decide to connect them onto the Internet, network security has become one of the most important concerns network system administrators face. In fact, these network administrators are facing threats from two fronts: the external Internet and the internal users within the company network. So network system administrators must be able to find ways to restrict access to the company network or sections of the network from both the “bad Internet” outside and from unscrupulous inside users.
References
Kizza JM (2002) Computer network security and cyber ethics. McFarland Publishers, Jefferson
Karose J, Ross K (2000) Computer networking: a top-down approach featuring the Internet. Addison-Wesley, Boston
Holden G (2004) A guide to firewalls and network security: intrusion detection and VPNs. Thomson Learning, Clifton Park
Provos N (2011) Firewall. http://www.win.tue.nl/henkvt/provos-firewall.pdf
Hall E (2002) Internet firewall essentials. http://secinf.net/firewalls_and_VPN/Internet_Firewall_Essentials.html
Panko RR (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River
Stein LD (1998) Web security: a step-by-step reference guide. Addison-Wesley, Reading
Grennan M (2000) Firewall and proxy server HOWTO. http://www.tldp.org/HOWTO/Firewall-HOWTO.html
Bar-Gad I (2002) Web firewalls. Network World, 06/03/02. http://www.nwfusion.com/news/tech/2002/0603tech.html
Fennelly C (2002) Building your firewall, Part 1. http://secinf.net/firewalls_and_VPN/Building_your_firewall_Part_1.html
Adams JM (2001) FTP Server Security Strategy for the DMZ, June 5, 2001. http://www.mscs.mu.edu/~hnguye/Security2002/Homeworks/assign4/DMZ.pdf
Semeria C, Internet firewalls and security a technology overview. http://www.patentsform.us/patents/5987611.html
Ranum MJ, Curtin M (2009) Internet firewalls: frequently asked questions. http://www.interhack.net/pubs/fwfaq/#SECTION00040000000000000000
Graham R (2000) Firewall forensics (what am I seeing?). http://www.robertgraham.com/pubs/firewall-seen.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). Firewalls. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_12
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_12
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)