Limitations of firewall, Computer Network Security

Limitations of firewall

Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls are also useless against attacks coming from inside the network. An inside attack can be from any legitimate user or from a virus that has arrived though an email or by some other mean on a local machine. Lastly a firewall also cannot restrict people from disclosing their login passwords into wrong hands. If such happens an intruder can access local network as a legitimate user and can easily exploit it.

Posted Date: 9/13/2012 5:59:39 AM | Location : United States







Related Discussions:- Limitations of firewall, Assignment Help, Ask Question on Limitations of firewall, Get Answer, Expert's Help, Limitations of firewall Discussions

Write discussion on Limitations of firewall
Your posts are moderated
Related Questions
Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

UDP DATAGRAM FORMAT: It is given in the figure below:

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f