Limitations of firewall, Computer Network Security

Limitations of firewall

Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls are also useless against attacks coming from inside the network. An inside attack can be from any legitimate user or from a virus that has arrived though an email or by some other mean on a local machine. Lastly a firewall also cannot restrict people from disclosing their login passwords into wrong hands. If such happens an intruder can access local network as a legitimate user and can easily exploit it.

Posted Date: 9/13/2012 5:59:39 AM | Location : United States







Related Discussions:- Limitations of firewall, Assignment Help, Ask Question on Limitations of firewall, Get Answer, Expert's Help, Limitations of firewall Discussions

Write discussion on Limitations of firewall
Your posts are moderated
Related Questions
Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit