TITLE

Firewalls: Dead and dying?

AUTHOR(S)
Dix, John
PUB. DATE
February 2002
SOURCE
Network World;2/25/2002, Vol. 19 Issue 8, p38
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
Editorial. Comments on the use of firewalls as a primary network defense by Internet sites. Security incidents on Internet sites with firewalls; Importance of tunneling and encryption in Internet sites; Problem concerning the adaptation of intrusion-detection systems by companies.
ACCESSION #
6497112

 

Related Articles

  • Supercharge your firewall. Thompson, Jon // APC (Bauer Media Group);Feb2008, Vol. 28 Issue 2, p103 

    The article offers tips on how to configure the security system of a desktop computer's firewall.

  • Firewall on Duty.  // IT Professional;Sep/Oct1999, Vol. 1 Issue 5, p69 

    Features the book 'Protecting Your Web Site With Firewalls,' by Marcus Goncalves. Security choices associated with Internet resources; Packet filtering; Tools that can identify weaknesses and improve authentication and passwords.

  • Ten-Stage Security Management Strategy Model for the Impacts of 'Security Threats on E --Business'. Tyagi, Narendra Kumar // International Journal of Computer Applications;May2011, Vol. 21, p1 

    This paper is an attempt to give a high-level overview of security in the e-business world. e-Business includes informational websites that are being fielded on an almost daily basis by companies. This paper attempted to view security concerns as a problem to be solved with technology and main...

  • Security. Goodwin, Bill // Computer Weekly;12/6/2005, p1 

    The article reports that a Foreign and Commonwealth Office Web site was recently defaced by a hacker in Great Britain, raising questions about the department's security procedures. The hacker, using the alias Shadow Moon, bypassed the department's firewalls to post a picture of a space alien on...

  • The Internet of Yesterday and Today. Withers, Laura // Rural Telecom;Sep/Oct2014, Vol. 33 Issue 5, p8 

    The article discusses the efforts of NTCA-The Rural Broadband Association to search for ways to employ Internet technologies to improve members' experience. Topics include the role of the power of the Internet in making members' relationship with NTCA more fun and more valuable, and NTCA's plan...

  • Combining expert knowledge with automatic feature extraction for reliable web attack detection. Torrano-Gimenez, Carmen; Nguyen, Hai Thanh; Alvarez, Gonzalo; Franke, Katrin // Security & Communication Networks;Nov2015, Vol. 8 Issue 16, p2750 

    In the detection of web attacks, it is necessary that Web Application Firewalls (WAFs) are effective, at the same time than efficient. In this paper, we propose a new methodology for web attack detection that enhances these two aspects of WAFs. It involves both feature construction and feature...

  • Security for Third Party Hosted Public Websites: Why It's Important to Sheriffs and What to do About It. Lange, Chuck; Colwell, Lee // Sheriff;Nov/Dec2011, Vol. 63 Issue 7, p44 

    The article discusses on the importance of website security to sheriffs' hosted public websites. It mentions that hacked public websites of sheriffs can provide unnecessary publicity to the sheriff, and may expose legal liability. It also mentions the significance of asking information...

  • Activists Are Finding New Ways Around China's Great Firewall. Rauhala, Emily // Time.com;11/21/2013, p1 

    The article reports on efforts of activists and academics to find new ways around China's Great Firewall censorship of the Internet as of November 21, 2013. China's move to block the Chinese-language websites of news organization Reuters and the "Wall Street Journal" newspaper is mentioned....

  • BREACH SECURITY UNVEILS BREACHGATE WEBDEFEND ENTERPRISE 2.0.  // Computer Security Update;Jan2007, Vol. 8 Issue 1, p5 

    The article reports on the announcement of Breach Security Inc. regarding the release of its Breachgate WebDefend Enterprise version 2.0 web application firewalls in Carlsbad, California. The new version delivers a scalable enterprise architecture capable of managing large sensor deployments and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics