This essay looks into new firewall features and how they enhance computer security. It describes how the firewall works in detail and elaborates on the structures and architecture of the firewall. Further, it expounds on measures which should be instituted to make internet marketing a safe environment for both marketers and the clients they target.Let our writers help you! They will create your custom paper for $12.01 $10.21/page 322 academic experts online
To achieve significant results and integrity in an organization, computer system security cannot be overlooked. In the recent past, computer security has become a major concern in most organizations. Due to adoption of electronic applications that facilitate e-trade, organizations are concerned with guarding against information theft and vandalism or misuse of computing resources. Applying early security strategies in organization helps minimize impact that can be caused by breach in security. Computer security breaches can be either physical or e-based.
E-based computer threats are the most worrisome to organizations. Such threats include hackers, viruses, and spyware. One effective way of dealing with computer security threats is introducing firewall. Firewall is a collection of programs that is installed in the gateway server in a computer network system. These programs help shield computer and its resources from being accessed by unwarranted users (Andress 46). For example, a business with an intranet allowing its employees to have access to internal company site and resources may install firewall to bar outsiders from accessing its private resources and data.
The firewall, apart from guarding against outside users, controls what warranted users have access to. The mechanism of a firewall works closely with a routing application (Vacca 57). It asses an individual network packet to ascertain if it can transmit to required destination. Firewall involves working in collaboration with proxy servers that enquires into network requests for individual work stations. It is installed on a separate computer that makes up part of the network. The installed computer is specifically tailored to ensure no incoming requests can directly be transmitted to the private network resources.
Firewall has the capability of filtering information that comes via the internet and extranets connections to an organization’s private network system. Firewall provides proxy services; this means information that comes from the internet is retrieved by firewall mechanism and then transmitted to the requesting resource and vice versa. This allows monitoring of the network efficiently (Vacca 90). It thoroughly inspects and compares certain important parts of a packet to trusted database information.
There exist several architectures that can be applied depending on each organization’s needs or peculiarities. Each kind of architecture has its own characteristics that best suits organizations’ of given characteristics. The first architecture is a screening router (Andress 69). This architecture involves placing packets on a router. A router only allows traffic to a designated destination. Therefore, once a firewall has been placed in the router, it ensures all destinations through the router are secure (Andress, 2003, p.89). This kind of architecture is simple and easy to implement. However, given routers have been designed only to offer routing traffic screening routers violates its working principle.Order now, and your customized paper without ANY plagiarism will be ready in merely 3 hours!
The second firewall architecture is screened subnet. This involves screening the host gateway in detail. The screening agent in this case is a router. The router being the first entry point to the organizations network, it is screened to enable incoming traffic between the internet and other public hosts are threat free. The screening is made easy by having a multiple of gateway hosts which can be web server, ftp server or proxy server. From the gateway, a connection is established to the intranet of a private business.
The screened router has the responsibility of protecting gateway from the internet and, in response; the gateway has to protect the business intranet and other hosts (Andress, 2003, p.92). This architecture is easy to implement because each host can be configured to exercise the services it needs by the server. Consequently, minimal potential hazards can elude this firewall and access a machine in the network. The resources on the subnet are made equally accessible.
Internet marketing plays a significant role in reaching more customers; access to customers is at a click of a button. To ensure that there is integrity and safety measures for both businesses and customers have to be put in place. This goes along way in boosting confidence while carrying out e-business. One measure to enhance safety for internet marketing is to guard against virus infection.
A Virus is a piece of malicious software that transforms itself into a host destroying important data and computer resources (Lammle, 2009, p.68). Computers without proper security measures are prone to these malicious programs. To have sound protection and propel internet marketing, good anti-virus protection is of value. Good anti-virus protection puts organizations steps ahead when viruses strike. Antivirus which is up to date detects and deletes the virus without extensively invading the system and the resources attached to it (Lammle, 2009, p.75).
The second measure that can ensure safe internet marketing is to be aware of hacking. Hacking has become a worldwide internet security concern. To prevent this unethical issue and stay safe in internet marketing, businesses should be cautious towards online files they read or open up on their systems.
The third measure to ensure online marketing is practiced in a safe environment is checking the contacts details. Sometimes, internet users or sites of interest do not display their contact details such as email addresses and phone numbers (Lammle, 2009, p.88). This is a sure sign of a trouble. When doing online marketing, provide full contacts of the business where the customers and other clients can reach you. Sites that do not have contact details or information are potentially fraudulent.We'll complete your 1st custom-written order tailored to your instructions with 15% OFF!
To ensure a secure platform is achieved in internet marketing, a security framework should be outlined by major stakeholders in the ISP sector. A standard security approach regarding policies and development principles should be outlined and implemented by major players in the ISP sector (Lammle, 2009, p.103). To establish a sound firewall security framework, there should be a collaborative effort between the stakeholders so as to identify and classify the visibility of services, users, monitor performance, usage and come up with a pattern that ensures a better compliance with the policy. There should be control in addressing and enforcing server application to ensure better isolation of users and systems so that a better infrastructure is established (Lammle, 2009, p.113). This will help mitigate security risks.
To establish an effective computer security system in an organization a clear policy is very handy. The policy should outline security measures to be established. Policy formulation should be followed with actions. Firewalls are a good way of securing a computer system. The concerned individuals in an organization have to consider the different firewall architectures and adopt one that best suits company characteristics. Further measures have to be taken e.g. caution when interacting with internet users and opening only online documents whose credibility is ascertainable. When all the outlined measures are taken, organizational capacity to do e-business is enhanced and customers will have confidence in it.
Andress, Amanda. Surviving Security: How to Integrate People, Process, and Technology. Boca Raton: CRC Press, 2003
Lammle, Todd. CompTIA Network+ Study Guide. New Jersey: John Wiley and Sons, 2009
Vacca, John R. Computer Forensics: Computer Crime Scene Investigation. Connecticut: Cengage Learning, 2005