Limitations of firewall, Computer Network Security

Limitations of firewall

Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls are also useless against attacks coming from inside the network. An inside attack can be from any legitimate user or from a virus that has arrived though an email or by some other mean on a local machine. Lastly a firewall also cannot restrict people from disclosing their login passwords into wrong hands. If such happens an intruder can access local network as a legitimate user and can easily exploit it.

Posted Date: 9/13/2012 5:59:39 AM | Location : United States







Related Discussions:- Limitations of firewall, Assignment Help, Ask Question on Limitations of firewall, Get Answer, Expert's Help, Limitations of firewall Discussions

Write discussion on Limitations of firewall
Your posts are moderated
Related Questions
Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

how can you enter the ASVAB practice test on line?

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi