By Topic

Firewalls fend off invasions from the Net

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Lodin, S.W. ; Ernst & Young, London, UK ; Schuba, C.L.

Whether a computer is in a corporation, government agency, university, small business, or at home, if it is linked to a network, hackers are a risk. The first line of defense against them is a firewall, provided it is set up correctly. Firewall technology is a set of mechanisms that collectively enforce a security policy on communication traffic entering or leaving a guarded network domain. The security policy is the overall plan for protecting the domain. Embodied in hardware, software, or both, a firewall guards and isolates the domain. Broadly, firewalls attempt to maintain privacy and ensure the authenticity of data communications that pass through their domain's boundaries. Whether data is entering or leaving a domain, it is protected from eavesdropping (passive wiretapping) and change (active wiretapping). But only communication traffic entering or leaving a domain comes under the influence of firewall technology

Published in:

Spectrum, IEEE  (Volume:35 ,  Issue: 2 )