Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Firewall’s Best Practices in an Organization

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 3
Year of Publication: 2012
Authors:
Vijender Kumar Solanki
Kumar Pal Singh
M. Venkatesan

Vijender Kumar Solanki, Kumar Pal Singh and M Venkatesan. Article: Firewalls Best Practices in an Organization. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(3):9-11, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Vijender Kumar Solanki and Kumar Pal Singh and M. Venkatesan},
	title = {Article: Firewalls Best Practices in an Organization},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {3},
	pages = {9-11},
	month = {November},
	note = {Full text available}
}

Abstract

The network security always remains attraction for the IT security professionals due to the availability of various solutions for the single problem such as opting single layered security approached e. g. , Software Based Firewall or Either select for High Range Firewalls or go for mixed solution which include the deployment of firewall including the NIDPS and Optional Monitoring Tools. However it is always tough for them to select which solution is the best one due to managerial as well as technical issues which suits to their organization's problem in current scenario [1]. In this paper we are discussing about the network security issues in the context of firewalls, how to opt an appropriate solution in view of present problem if any. The administrators options varies from the theoretical approach as they do not follow the security standards and their policies as mentioned in security books however in the organization instead of that they just tuned up most demanding protocols and handle the most immediate problem in context of security.

References

  • Charles C. Zhang, Marianne Winslett, Carl A. Günter, On the Safety and Efficiency of Firewall Policy Deployment,2007 IEEE Symposium on Security and Privacy (SP'07).
  • Cisco Firewall Services Module http://www. cisco. com/en/US/products/hw/modules /ps2706/ps4452. html.
  • Patrick W. Dowd, John T. McHenry, Network Security: It's Time to Take it Seriously, Computers, IEEE Sept, 1998.
  • Jan L. Harrington, Network Security: A Practical Approach, Elsevier, Edition 2011.
  • Gunnar Peterson, Security Architecture Blueprint, Arctec Group, LLC.
  • IBM Service Management Series White Paper, March 2008, Take a Holistic Approach to Business-Driven Security.
  • Eric Seagren, Wesley J. Noonan, Secure Your Network For Free, Elsevier Professional and Trade Series Edition 2007.
  • Alain Mayer, Avinashi Wool, Elisha Ziskind, FANG: A Firewall Engine, 2000 IEEE.
  • Alex X. Liu, Mohamed G, Gouda, Diverse Firewall Design, IEEE Transaction on Parallel and Distributed System, Vol 19, No 9, September 2008.
  • P. Bera, S. K. Gosh, Pallabh dasgupta, Policy Based Security Analysis in Enterprise networks: A Formal Approach, IEEE Transaction of Network and Service Management Vol 7, No 4, December 2010.
  • Ehab Al-Shaer, Adel El-Atway, and Taghrid Samak, Automated Pseudo-Live Testing of Firewall Configuration Enforcement, IEEE Journal on Selected Area in Communications, Vol 27, No 03, April 2009.
  • Kevin. W. Helman,Vishwath,Mohan,M. M. Masud,L,K han,B. Thuraisingam, Exloiting An Antivirus Inteface,Computer Standard and Interface 31(2009),1182-1189.