Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Firewall

Modern Theories and Practices for Cyber Ethics and Security Compliance
A hardware device or software program that controls the passage of traffic at a network boundary according to a predefined set of rules.
Published in Chapter:
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Winfred Yaokumah (University of Ghana, Ghana), Ferdinard Katsriku (University of Ghana, Ghana), Jamal-Deen Abdulai (University of Ghana, Ghana), and Kwame Okwabi Asante-Offei (Ghana Institute of Management and Public Administration, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch002
Abstract
Application security measures are the controls within software systems that protect information assets from security attacks. Cyber attacks are largely carried out through software systems running on computing systems in cyberspace. To mitigate the risks of cyber attacks on software systems, identification of entities operating within cyberspace, threats to application security and vulnerabilities, and defense mechanisms are crucial. This chapter offers a taxonomy that identifies assets in cyberspace, classifies cyber threats into eight categories (buffer overflow, malicious software, input attacks, object reuse, mobile code, social engineering, back door, and logic bomb), provides security defenses, and maps security measures to control types and functionalities. Understanding application security threats and defenses will help IT security professionals in the choice of appropriate security countermeasures for setting up strong defense-in-depth mechanisms. Individuals can also apply these safeguards to protect themselves from cyber-attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Crime Identification Using Traffic Analysis of HTTP Botnet
A firewall is a network security system that allows or denies incoming and outgoing network traffic based on predetermined security rules.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
A device or software to selectively filter packets.
Full Text Chapter Download: US $37.50 Add to Cart
On the Stability of Peer-to-Peer Networks in Real-World Environments
This is a host or router which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
Status and Future Trends of Multimedia Interactivity on the Web
A collection of systems that enforce an access control policy amount networks. Typically the firewall is located between the internal network and the outside network to block unauthorized traffic (Butcher-Powell, 2005).
Full Text Chapter Download: US $37.50 Add to Cart
Early Detection and Recovery Measures for Smart Grid Cyber-Resilience
A software or hardware that is designed to block and prevent unwanted or unauthorized network traffic between computer networks or hosts.
Full Text Chapter Download: US $37.50 Add to Cart
The Analysis of Top Cyber Investigation Trends
Hardware or software solutions used to prevent unauthorized access to private networks through the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Practical Measures for Securing Government Networks
A firewall is a system designed to prevent unauthorized access to or from a network. Firewalls can be implemented in both hardware and software, or a combination of both. There are several types of firewall techniques. These include packet filter, application gateway, circuit-level gateway, and proxy server.
Full Text Chapter Download: US $37.50 Add to Cart
Network-Based Intrusion Detection
This is a host or router, which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
It is a device from a network of computers that has the function of regulating network traffic between unrelated networks and preventing the transmission and/or reception of harmful or unauthorized data from one network to another.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Detection Based on P2P Software
This is a host or router which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
E-Collaboration Enhanced Host Security
This is a host or router which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems
A hardware/software capability that limits access between networks and/or systems in accordance with a specific security policy.
Full Text Chapter Download: US $37.50 Add to Cart
Role of Artificial Intelligence in Cyber Security: A Useful Overview
Is a network security device which is used to monitor the incoming and outgoing packets in a network. It follows a set of security rules, based on which it blocks the packets it finds suspicious.
Full Text Chapter Download: US $37.50 Add to Cart
A Novel Application of the P2P Technology for Intrusion Detection
This is a host or router which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
Videoconferencing for Supervision of Graduate Students
A set of related programs that reside on a network gateway server that protects the resources of a private network from users from other networks.
Full Text Chapter Download: US $37.50 Add to Cart
Employer Branding and Internet Security
Computer, device connecting company local Network with global network (Internet).
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
In network security, firewall is a system used to keep surveillance over the traffic passing through it in and out on the basis of some prior defined security protocols. It basically protects the trusted network from the untrusted one like Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Methods for Operating System Security
This is a host or router, which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
Contemporary Security Threats: Some Proposals for Banking Networks in Bangladesh
Incoming and outgoing traffic is monitored and filtered according to an organization's specified security standards by a Firewall. An internal network's firewall acts as a barrier between it and the public Internet at its most basic.
Full Text Chapter Download: US $37.50 Add to Cart
E-Accounting: Future Challenges and Perspectives
Hardware and software used to prevent unauthorized access to a computer or network.
Full Text Chapter Download: US $37.50 Add to Cart
Application of the P2P Model for Adaptive Host Protection
This is a host or router that provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer (P2P) Network Security: Firewall Issues
A firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction.
Full Text Chapter Download: US $37.50 Add to Cart
Firewalls as Continuing Solutions for Network Security
A device and/or software designed to protect networks of differing security levels.
Full Text Chapter Download: US $37.50 Add to Cart
Software in Amateur “Packet Radio” Communications and Networking
A peace of software that is a part of the operating system or can be an external program. It serves to protect a particular computer system it is installed on, or to protect a group of machines in a local area network (LAN).
Full Text Chapter Download: US $37.50 Add to Cart
Digital State Strategy
A security system used in computer networks to monitor network traffic.
Full Text Chapter Download: US $37.50 Add to Cart
Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions
A software or hardware that is designed to block the unwanted or unauthorized network traffic between computer networks or hosts. Firewalls are mostly considered as a part of IPS that constitutes the first line of defense in the provisioning of the information security services.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR