Limitations of firewall, Computer Network Security

Limitations of firewall

Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls are also useless against attacks coming from inside the network. An inside attack can be from any legitimate user or from a virus that has arrived though an email or by some other mean on a local machine. Lastly a firewall also cannot restrict people from disclosing their login passwords into wrong hands. If such happens an intruder can access local network as a legitimate user and can easily exploit it.

Posted Date: 9/13/2012 5:59:39 AM | Location : United States







Related Discussions:- Limitations of firewall, Assignment Help, Ask Question on Limitations of firewall, Get Answer, Expert's Help, Limitations of firewall Discussions

Write discussion on Limitations of firewall
Your posts are moderated
Related Questions
Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

What is the concept of topology?

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)