Limitations of firewall, Computer Network Security

Limitations of firewall

Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls are also useless against attacks coming from inside the network. An inside attack can be from any legitimate user or from a virus that has arrived though an email or by some other mean on a local machine. Lastly a firewall also cannot restrict people from disclosing their login passwords into wrong hands. If such happens an intruder can access local network as a legitimate user and can easily exploit it.

Posted Date: 9/13/2012 5:59:39 AM | Location : United States







Related Discussions:- Limitations of firewall, Assignment Help, Ask Question on Limitations of firewall, Get Answer, Expert's Help, Limitations of firewall Discussions

Write discussion on Limitations of firewall
Your posts are moderated
Related Questions
Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc