Firewalls and its types: A review

Authors

  • Pooja Bansal

Keywords:

Protecting, firewall, Internet, Security

Abstract

Protecting our sensitive data from undesired and unauthorised sources is a major concern nowadays. There are a variety of methods and gadgets that may give varying degrees of security and aid in the protection of our personal information. A 'firewall,' for example, keeps our computers and data safe and secure by preventing illegal access. firewalls as well as other related subjects in this post, such as why we need firewalls, their roles, their limits, how they operate, and so on.

References

Wojciech Konikiewicz & Marcin Markowski (2017), Analysis of Performance and Efficiency of Hardware and Software Firewalls, Vol. 9, No. 1, pp. 49

Richa Sharma & Chandresh Parekh (2017), A Study and Its Classification, Volume 8, No. 4, May – June 2017

Xin Yue, Wei Chen, Yantao Wang (2009). The research of firewall technology in computer network security. DOI:10.1109/PACIIA.2009.5406566

Miss. Shwetambari G. Pundkar & Prof. Dr. G. R. Bamnote (2014), Analysis of firewall technology in computer network technology in computer network security, Vol.3 Issue.4, April- 2014, pg. 841-846

Steven Thomason (2012), Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices, Volume 12 Issue 13 Version 1.0 Year 2012

RahatAfreen, S.C. Mehrotra, (2011). A Review on Elliptic Curve Cryptography for Embedded Systems. International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011, Pp 84-103.

Srivaths Ravi, AnandRaghunathan, Paul Kocher, Sunil Hattangady, (2004). Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing SystemsVolume 3Issue 3August 2004 pp 461–491https://doi.org/10.1145/1015047.1015049.

Junfeng Fan; LejlaBatina; Ingrid Verbauwhede (2009). Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

Downloads

Published

31-12-2016

How to Cite

Pooja Bansal. (2016). Firewalls and its types: A review. International Journal for Research Publication and Seminar, 7(9), 197–201. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1075

Issue

Section

Original Research Article