CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Firewall�s Best Practices in an Organization

Published on November 2012 by Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 3
November 2012
Authors: Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan
1e5268b7-23d6-4728-9a1e-acedcd02bbb7

Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan . Firewall�s Best Practices in an Organization. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 3 (November 2012), 9-11.

@article{
author = { Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan },
title = { Firewall�s Best Practices in an Organization },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 3 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 9-11 },
numpages = 3,
url = { /proceedings/ctngc/number3/9063-1025/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Vijender Kumar Solanki
%A Kumar Pal Singh
%A M. Venkatesan
%T Firewall�s Best Practices in an Organization
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 3
%P 9-11
%D 2012
%I International Journal of Computer Applications
Abstract

The network security always remains attraction for the IT security professionals due to the availability of various solutions for the single problem such as opting single layered security approached e. g. , Software Based Firewall or Either select for High Range Firewalls or go for mixed solution which include the deployment of firewall including the NIDPS and Optional Monitoring Tools. However it is always tough for them to select which solution is the best one due to managerial as well as technical issues which suits to their organization's problem in current scenario [1]. In this paper we are discussing about the network security issues in the context of firewalls, how to opt an appropriate solution in view of present problem if any. The administrators options varies from the theoretical approach as they do not follow the security standards and their policies as mentioned in security books however in the organization instead of that they just tuned up most demanding protocols and handle the most immediate problem in context of security.

References
  1. Charles C. Zhang, Marianne Winslett, Carl A. Günter, On the Safety and Efficiency of Firewall Policy Deployment,2007 IEEE Symposium on Security and Privacy (SP'07).
  2. Cisco Firewall Services Module http://www. cisco. com/en/US/products/hw/modules /ps2706/ps4452. html.
  3. Patrick W. Dowd, John T. McHenry, Network Security: It's Time to Take it Seriously, Computers, IEEE Sept, 1998.
  4. Jan L. Harrington, Network Security: A Practical Approach, Elsevier, Edition 2011.
  5. Gunnar Peterson, Security Architecture Blueprint, Arctec Group, LLC.
  6. IBM Service Management Series White Paper, March 2008, Take a Holistic Approach to Business-Driven Security.
  7. Eric Seagren, Wesley J. Noonan, Secure Your Network For Free, Elsevier Professional and Trade Series Edition 2007.
  8. Alain Mayer, Avinashi Wool, Elisha Ziskind, FANG: A Firewall Engine, 2000 IEEE.
  9. Alex X. Liu, Mohamed G, Gouda, Diverse Firewall Design, IEEE Transaction on Parallel and Distributed System, Vol 19, No 9, September 2008.
  10. P. Bera, S. K. Gosh, Pallabh dasgupta, Policy Based Security Analysis in Enterprise networks: A Formal Approach, IEEE Transaction of Network and Service Management Vol 7, No 4, December 2010.
  11. Ehab Al-Shaer, Adel El-Atway, and Taghrid Samak, Automated Pseudo-Live Testing of Firewall Configuration Enforcement, IEEE Journal on Selected Area in Communications, Vol 27, No 03, April 2009.
  12. Kevin. W. Helman,Vishwath,Mohan,M. M. Masud,L,K han,B. Thuraisingam, Exloiting An Antivirus Inteface,Computer Standard and Interface 31(2009),1182-1189.
Index Terms

Computer Science
Information Sciences

Keywords

Keywords Network Security Internet Protocol Firewall Security Management