Skip to main content

Firewalls

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 3133 Accesses

Abstract

The rapid growth of the Internet has led to a corresponding growth of both users and activities in cyberspace. Unfortunately, not all these users and their activities are reputable; thus, the Internet has been increasingly, at least to many individuals and businesses, turning into a “bad Internet.” Bad people are plowing the Internet with evil activities that include, among other things, intrusion into company and individual systems looking for company data and individual information that erodes privacy and security. There has, therefore, been a need to protect company systems and now individual devices, keeping them from those “bad users” out on the “bad Internet.” As companies build private networks and decide to connect them onto the Internet, network security has become one of the most important concerns network system administrators face. In fact, these network administrators are facing threats from two fronts: the external Internet and the internal users within the company network. So network system administrators must be able to find ways to restrict access to the company network or sections of the network from both the “bad Internet” outside and from unscrupulous inside users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Kizza JM (2002) Computer network security and cyber ethics. McFarland Publishers, Jefferson

    Google Scholar 

  2. Karose J, Ross K (2000) Computer networking: a top-down approach featuring the Internet. Addison-Wesley, Boston

    Google Scholar 

  3. Holden G (2004) A guide to firewalls and network security: intrusion detection and VPNs. Thomson Learning, Clifton Park

    Google Scholar 

  4. Provos N (2011) Firewall. http://www.win.tue.nl/henkvt/provos-firewall.pdf

  5. Hall E (2002) Internet firewall essentials. http://secinf.net/firewalls_and_VPN/Internet_Firewall_Essentials.html

  6. Panko RR (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River

    Google Scholar 

  7. Stein LD (1998) Web security: a step-by-step reference guide. Addison-Wesley, Reading

    Google Scholar 

  8. Grennan M (2000) Firewall and proxy server HOWTO. http://www.tldp.org/HOWTO/Firewall-HOWTO.html

  9. Bar-Gad I (2002) Web firewalls. Network World, 06/03/02. http://www.nwfusion.com/news/tech/2002/0603tech.html

  10. Fennelly C (2002) Building your firewall, Part 1. http://secinf.net/firewalls_and_VPN/Building_your_firewall_Part_1.html

  11. Adams JM (2001) FTP Server Security Strategy for the DMZ, June 5, 2001. http://www.mscs.mu.edu/~hnguye/Security2002/Homeworks/assign4/DMZ.pdf

  12. Semeria C, Internet firewalls and security a technology overview. http://www.patentsform.us/patents/5987611.html

  13. Ranum MJ, Curtin M (2009) Internet firewalls: frequently asked questions. http://www.interhack.net/pubs/fwfaq/#SECTION00040000000000000000

  14. Graham R (2000) Firewall forensics (what am I seeing?). http://www.robertgraham.com/pubs/firewall-seen.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). Firewalls. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_12

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics