To see the other types of publications on this topic, follow the link: Firewalls.

Dissertations / Theses on the topic 'Firewalls'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Firewalls.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Verwoerd, Theuns Willem. "Stateful distributed firewalls." Thesis, University of Canterbury. Computer Science and Software Engineering, 2001. http://hdl.handle.net/10092/9620.

Full text
Abstract:
A fundamental feature in current network security architectures is the monolithic firewall. This thesis presents an alternative design, consisting of a cluster of small firewall nodes, that offers better economy, scalability, failure recovery and potentially, greatly increased processing power. These improvements allow the use of computationally expensive firewalling and IDS techniques to offer effective protection against all types of network attack. Also presented are techniques for developing fault-tolerant proxy applications, maintaining connections in spite of node failures, and a novel l
APA, Harvard, Vancouver, ISO, and other styles
2

Bonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.

Full text
Abstract:
Firewalls help protect computer networks from intrusions and malware by enforcing restrictions on what network traffic is allowed to pass through the firewall into the network. This thesis explores the role of firewalls in network security, with the ultimate goal of advancing attempts to create a threat model for firewalls. Five areas are explored, namely: Definitions of Concepts Firewalls vs. Services as Targets for Direct Attack The Past and Future of Firewalls Approach to Estimating Firewall Security Firewall Configuration and Security Policies These areas are explored using a questionnair
APA, Harvard, Vancouver, ISO, and other styles
3

Schreiber, Alexander. "Firewalls - Brandmauer oder Feuermelder ?" Universitätsbibliothek Chemnitz, 1999. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199900516.

Full text
Abstract:
Firewalls - oft als scheinbar magisches Wundermittel für den Schutz von Firmennetzen vor dem Schrecken der allgegenwärtigen Hacker angepriesen - sind nur ein Teil einer Sicherheitsarchitektur. Wie funktionieren sie, was tun sie? Was vermögen sie wirklich zu leisten, was nicht? Ist die Installation eines Firewalls ausreichend oder muß noch mehr getan werden um wirklich sicher zu sein und sich nicht nur sicher zu fühlen? Sind sie nur lästig (Sicherheit versus Bequemlichkeit) oder notwendig?
APA, Harvard, Vancouver, ISO, and other styles
4

Hearn, Kay, and n/a. "Sniffer Packets & Firewalls." University of Canberra. n/a, 2008. http://erl.canberra.edu.au./public/adt-AUC20081217.153550.

Full text
Abstract:
Falun Gong protesters, the bombing of the Chinese Embassy in Belgrade, the spy plane incident and a series of mine accidents are just some of the events over the past decade that involved the Internet. In each incident the leadership of the Chinese Communist Party (CCP) was caught off guard by the circumvention of informational flows as a consequence of the Internet. This is in some ways indicative of the impact the medium is having on the ability of the CCP to manage political discourse within the confines of the country. This thesis examines the way that political discourse in contemporary C
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Höfler, Torsten, Christian Burkert, and Martin Telzer. "Comparative Firewall Study." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harris, B. A. "Firewalls and virtual private networks." Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.

Full text
Abstract:
The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer - communications industry than any other development in its history. There are two major issues effecting the development of the Internet for the 21st century; performance and security. This thesis is concerned with the later; in particular the issues raised by the interconnection of TCP/IP based networks between trusted and untrusted network domains. Four main topics are addressed: the common threats and vulnerabilities that effect the TCP/IP protocol suite at the Network, Tran
APA, Harvard, Vancouver, ISO, and other styles
10

Rangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaves 53-54).<br>by Vinod K. Rangarajan.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
11

Gasant, Mogamad Yaqeen. "Firewall information and security visualization : improving the usage and adoption of modern network firewalls by novice users." Master's thesis, University of Cape Town, 2007. http://hdl.handle.net/11427/6398.

Full text
Abstract:
Word processed copy.<br>Includes bibliographical references (leaves 77-79).<br>The increasing number of people having access to computers and the Internet and the numerous services provided by the Internet - e.g., Internet banking, online shopping, eBay, email - emphasizes the need for computer security which is understandable to novice users. Whilst the technology underlying a firewall is effective, most users have no idea how to configure the software to suit their needs. This research focuses on personal firewalls because it is our belief and I will show that personal firewalls are more at
APA, Harvard, Vancouver, ISO, and other styles
12

Horowitz, Eduardo. "Estudo sobre a extração de políticas de firewall e uma proposta de metodologia." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/12075.

Full text
Abstract:
Com o aumento das ameaças na Internet, firewalls tornaram-se mecanismos de defesa cada vez mais utilizados. No entanto, sua configuração é notadamente complexa, podendo resultar em erros. Vários estudos foram realizados com o intuito de resolver tais problemas, mas a grande maioria deles se concentrou em trabalhar diretamente no nível de configuração, o que possui limitações. O presente trabalho investiga maneiras de extrair políticas em mais alto nível a partir de regras de firewall em baixo nível, o que é mais intuitivo. A fim de extrair as políticas reais a partir de regras de firewall, o p
APA, Harvard, Vancouver, ISO, and other styles
13

Raja, Fahimeh. "Towards improving the usability of personal firewalls." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/31028.

Full text
Abstract:
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. An initial series of usability studies on the Windows Vista firewall that we performed revealed that the participants' lack of an accurate mental model about the firewall's system model significantly contributed to their errors when configuring the firewall. The goal of this thesis research was to build upon these findings and improve the usability of personal firewalls. To do so, we redesigned the user interface of the Vista firewall to mo
APA, Harvard, Vancouver, ISO, and other styles
14

Sailou, Lionel. "Network firewalls dynamic performance evaluation and formalisation." Thesis, Edinburgh Napier University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Nalla, Vipan Reddy R. "Anonymity and covert channels in mix-firewalls." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0007303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Elnerud, Albin. "Comparison of hardware firewalls in a network environment." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-35608.

Full text
Abstract:
Today’s market offers a wide range of available firewalls, there are many manufacturers andeach of them has at least several series of possible solutions. As organisations and companiesseek to protect their assets against current and new hostile threats, the demands for networksecurity increases and drives the development of firewalls forward. With new firewalltechnologies emerging from a wide variety of firewall vendors, choosing the right firewall canbe both costly and time consuming. Requirements for a concrete network are needed to becorrelated with security functionalities, i.e., metrics
APA, Harvard, Vancouver, ISO, and other styles
17

Bhattacharya, Hrishikesh. "On the Modular Verification and Design of Firewalls." Thesis, The University of Texas at Austin, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3572873.

Full text
Abstract:
<p> Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of traffic (and discard any undesirable packets), are a prominent component of network security. In this dissertation, we make several contributions to the study of firewalls.</p><p> 1. Current algorithms for verifying the correctness of firewall policies use <i>O</i>(<i>n<sup>d</sup></i>) space, where <i>n</i> is the number of rules in the firewall (several thousand) and <i>d</i> the number of fields in a rule (about five). We develop a fast probabilistic firewall verification algorithm, wh
APA, Harvard, Vancouver, ISO, and other styles
18

Joyner, William L. "Design of a load-balancing architecture for parallel firewalls." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362273.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 1999.<br>Thesis advisor(s): Cynthia E. Irvine. "March 1999". Includes bibliographical references (p. 119-121). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
19

AHMAD, MUHAMMAD ZEESHAN. "Comparative Analysis of Iptables and Shorewall." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6181.

Full text
Abstract:
The use of internet has increased over the past years. Many users may not have good intentions. Some people use the internet to gain access to the unauthorized information. Although absolute security of information is not possible for any network connected to the Internet however, firewalls make an important contribution to the network security. A firewall is a barrier placed between the network and the outside world to prevent the unwanted and potentially damaging intrusion of the network. This thesis compares the performance of Linux packet filtering firewalls, i.e. iptables and shorewall. T
APA, Harvard, Vancouver, ISO, and other styles
20

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Asarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Giannakou, Anna. "Self-adaptable Security Monitoring for IaaS Cloud Environments." Thesis, Rennes, INSA, 2017. http://www.theses.fr/2017ISAR0021/document.

Full text
Abstract:
Les principales caractéristiques des clouds d'infrastructure (laaS), comme l'élasticité instantanée et la mise à disposition automatique de ressources virtuelles, rendent ces clouds très dynamiques. Cette nature dynamique se traduit par de fréquents changements aux différents niveaux de l'infrastructure virtuelle. Étant données la criticité et parfois la confidentialité des informations traitées dans les infrastructures virtuelles des clients, la supervision de sécurité est une préoccupation importante pour les clients comme pour le fournisseur de cloud. Malheureusement, les changements dynami
APA, Harvard, Vancouver, ISO, and other styles
23

Farley, Ryan Joseph. "Parallel firewall designs for high-speed networks /." Electronic thesis, 2005. http://etd.wfu.edu/theses/available/etd-12142005-194043/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sulaman, Sardar Muhammad. "An Analysis and Comparison of The Security Features of Firewalls and IDSs." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-72934.

Full text
Abstract:
In last few years we have observed a significant increase in the usage of computing devices and their capabilities to communicate with each other. With the increase in usage and communicating capabilities the higher level of network security is also required. Today the main devices used for the network security are the firewalls and IDS/IPS that provide perimeter defense. Both devices provide many overlapping security features but they have different aims, different protection potential and need to be used together. A firewall is an active device that implements ACLs and restricts unauthorized
APA, Harvard, Vancouver, ISO, and other styles
25

Al-saqaf, Walid. "Breaking digital firewalls : analyzing internet censorship and circumvention in the arab world." Doctoral thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-34596.

Full text
Abstract:
This dissertation explores the role of Internet censorship and circumvention in the Arab world as well as Arabs’ views on the limits to free speech on the Internet. The project involves the creation of an Internet censorship circumvention tool named Alkasir that allows users to report and access certain types of censored websites. The study covers the Arab world at large with special focus on Egypt, Syria, Tunisia, and Yemen. This work is of interdisciplinary nature and draws on the disciplines of media and communication studies and computer science. It uses a pioneering experimental approach
APA, Harvard, Vancouver, ISO, and other styles
26

Savacool, Richard. "Firewall resistance to metaferography in network communications /." Online version of thesis, 2010. http://hdl.handle.net/1850/12272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a comuter network operating in a defense-in-depth posture /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FGivens.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.<br>Thesis advisor(s): Alex Bordetsky, Joe Roth. Includes bibliographical references (p. 89-90). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
28

Junior, José Mauricio Bonifacio. "Sistema de Segurança Distribuído: Integração de Firewalls com Sistemas de Detecção de Intrusão." Universidade de São Paulo, 1998. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-15032018-140823/.

Full text
Abstract:
Atualmente, segurança de redes é um assunto de vital importância nas mais diversas áreas. O crescimento e popularização da Internet fizeram com que diversos serviços essenciais fossem realizados através da rede e cada vez mais redes privadas se conectassem para desfrutar de todos os benefícios oferecidos. Por outro lado, atos de pirataria e ataques aos computadores tem causado enormes prejuízos e danos. Este cenário exige mecanismos altamente eficazes para se aumentar a segurança cias redes conectadas à Internet. Atualmente, a solução mais utilizada é o firewall, porém, sob diversas circunstân
APA, Harvard, Vancouver, ISO, and other styles
29

Gonsales, Panes Guilherme [UNESP]. "Firewall Dinâmico: uma implementação cliente/servidor." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/89341.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:24:01Z (GMT). No. of bitstreams: 0 Previous issue date: 2011-07-29Bitstream added on 2014-06-13T20:11:43Z : No. of bitstreams: 1 gonsalespanes_g_me_sjrp.pdf: 460030 bytes, checksum: 52240d29e75235682133dfc019184aff (MD5)<br>A proteção dos perímetros de segurança realizada através de firewalls somente é eficiente quando o cliente se encontra dentro do perímetro protegido por este firewall. Como mobilidade é um item essencial para as empresas, há um grande desafio na proteção destes clientes computacionais (Laptops e PDAs), pois é necessário aplicar a
APA, Harvard, Vancouver, ISO, and other styles
30

JESUS, Y. K. F. "Análise e Detecção de Inconsistências em Políticas de Segurança - Um Estudo Prático com Firewalls." Universidade Federal do Espírito Santo, 2016. http://repositorio.ufes.br/handle/10/9822.

Full text
Abstract:
Made available in DSpace on 2018-08-02T00:03:43Z (GMT). No. of bitstreams: 1 tese_10269_ata de defesa.pdf: 633434 bytes, checksum: 225ab3b7fd1d716fae1937fdb48b3f4b (MD5) Previous issue date: 2016-09-02<br>Garantir a consistência das regras que implementam uma política de segurança de rede através de um firewall é uma tarefa complexa, podendo gerar vulnerabilidades na rede quando mal executada. Este problema torna-se ainda maior quando falamos de dois ou mais firewalls interconectados visto que há a necessidade de verificar não só as regras de cada firewall individualmente como também cada p
APA, Harvard, Vancouver, ISO, and other styles
31

Spohn, Marco Aurelio. "Desenvolvimento e análise de desempenho de um 'packet/session filter'." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 1997. http://hdl.handle.net/10183/17970.

Full text
Abstract:
A segurança em sistemas de computação é uma das áreas mais críticas nas ciências da informação. Freqüentemente se ouve falar em alguma "brecha" descoberta em algum sistema. Não importando quão grave seja o problema, já existe certa paranóia em relação a questões de segurança. Esses furos na segurança podem ser explorados de diversas maneiras: para obter benefícios financeiros indevidos, personificação maliciosa a custos de uma pretensa "brincadeira", perda de informações sigilosas, danos em arquivos do sistema, etc. Esses são alguns dos motivos porque se investe cada vez mais em segurança. Com
APA, Harvard, Vancouver, ISO, and other styles
32

Hudson, Tina M., and Cathy Galyon-Keramidas. "Leaping over Firewalls! Identifying and Overcoming Barriers with School Districts to Promote Collaboration with Technology." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/4000.

Full text
Abstract:
Institutes of higher education with teacher education programs are increasingly utilizing video technology for field supervision. Many rural school districts, however, are still reluctant to allow the use of video, even when it is required of edTPA. The presenters will discuss recent experiences and propose possible solutions based on research.
APA, Harvard, Vancouver, ISO, and other styles
33

Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
APA, Harvard, Vancouver, ISO, and other styles
34

Nelson, Timothy. "Margrave: An Improved Analyzer for Access-Control and Configuration Policies." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/203.

Full text
Abstract:
As our society grows more dependent on digital systems, policies that regulate access to electronic resources are becoming more common. However, such policies are notoriously difficult to configure properly, even for trained professionals. An incorrectly written access-control policy can result in inconvenience, financial damage, or even physical danger. The difficulty is more pronounced when multiple types of policy interact with each other, such as in routers on a network. This thesis presents a policy-analysis tool called Margrave. Given a query about a set of policies, Margrave returns
APA, Harvard, Vancouver, ISO, and other styles
35

Felker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gonsales, Panes Guilherme. "Firewall Dinâmico : uma implementação cliente/servidor /." São José do Rio Preto : [s.n.], 2011. http://hdl.handle.net/11449/89341.

Full text
Abstract:
Orientador: Marcos Cavenaghi<br>Coorientador: Roberta Spolon<br>Banca: Aparecido Nilceu Marana<br>Banca: Hélio Crestana Guardia<br>Resumo: A proteção dos perímetros de segurança realizada através de firewalls somente é eficiente quando o cliente se encontra dentro do perímetro protegido por este firewall. Como mobilidade é um item essencial para as empresas, há um grande desafio na proteção destes clientes computacionais (Laptops e PDAs), pois é necessário aplicar a Política de Segurança da empresa independentemente de onde estes equipamentos estejam se conectando já que a segurança dos dados
APA, Harvard, Vancouver, ISO, and other styles
37

Nelson, Tim. "First-Order Models for Configuration Analysis." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/452.

Full text
Abstract:
Our world teems with networked devices. Their configuration exerts an ever-expanding influence on our daily lives. Yet correctly configuring systems, networks, and access-control policies is notoriously difficult, even for trained professionals. Automated static analysis techniques provide a way to both verify a configuration's correctness and explore its implications. One such approach is scenario-finding: showing concrete scenarios that illustrate potential (mis-)behavior. Scenarios even have a benefit to users without technical expertise, as concrete examples can both trigger and improve us
APA, Harvard, Vancouver, ISO, and other styles
38

Malmgren, Andreas, and Simon Persson. "A comparative study of Palo Alto Networks and Juniper Networks next-generation firewalls for a small enterprise network." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-31767.

Full text
Abstract:
This thesis is a comparative study of two Next-Generation Firewalls (NGFWs) with the aim to conclude which one is the most suitable for a small enterprise network. The network in question is Company A’s Office A1. Office A is in the process of upgrading their internal network and with the upgrade a new NGFW will be implemented. The two NGFW platforms that have been researched per Company A’s request are Juniper Networks’ SRX-series firewalls and Palo Alto Networks’ (PAN) PA-series, with focus on the SRX1500 and PA-3020 for a fair comparison. To be able to evaluate different platforms and appli
APA, Harvard, Vancouver, ISO, and other styles
39

Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Felker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.

Full text
Abstract:
Approved for public release, distribution unlimited<br>The progression of technology is continuous and the technology that drives interpersonal communication is not an exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible. This thesis answers why collaborative environments are important in today's online productivity. In doing so, it gives the reader a comprehensive background in distributed collaborative environments, answers how collaborative environmen
APA, Harvard, Vancouver, ISO, and other styles
41

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and ma
APA, Harvard, Vancouver, ISO, and other styles
42

Coetzee, Dirk. "Visualisation of PF firewall logs using open source." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018552.

Full text
Abstract:
If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking a
APA, Harvard, Vancouver, ISO, and other styles
43

Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.

Full text
Abstract:
Thesis (M.S.)--Naval Postgraduate School, 2004.<br>Title from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
APA, Harvard, Vancouver, ISO, and other styles
44

Marjanovic, Uros. "Exploration of a method for constructing an industrial ethernet with ethernet enabled devices in an industrial environment using a Cisco adaptive security appliance /." View online, 2009. http://repository.eiu.edu/theses/docs/32211131565124.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Björn, Johan. "Extending a Platform for IT-Security Exercises." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68883.

Full text
Abstract:
The Swedish Defence Research Agency, FOI, has developed a platform that is used to train and study IT-security. This platform was used during the cyber Baltic shield, an international cyber security exercise. During the exercise, a number of teams acting as system administrators, tried to secure and defend the system of a fictive power supply company. Another team acted as a terrorist organisation with the goal to compromise the systems of the power supply companies and shut down their power generators. FOI has also developed a security assessment method, named XMASS, which is implemented in a
APA, Harvard, Vancouver, ISO, and other styles
46

Quispe, Ordoñez Christian Isaac. "Diseño e implementación de un balanceador de carga para la optimización de los recursos de protección en una red Enterprise mediante un banco de Firewalls N: 1 controlado vía SDN." Pontificia Universidad Católica del Perú, 2019. http://hdl.handle.net/20.500.12404/15579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Wagner, Oto. "Problematika firewallů." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-2124.

Full text
Abstract:
Práce se zabývá problematikou firewallů a jejich vývojem. Rozdělena je na 4 hlavní části. V první (teoretické) části jsou rozpracovány některé důležité koncepty síťového provozu ? především pak ty s dopadem na zajištění bezpečného přístupu k síti. Rovněž jsou roztříděny firewally a zmíněny konkrétní dopady (přínosy) jejich nasazení. Na konci kapitoly si ještě rozebereme Standardy, které v této oblasti existují (především pak TCSEC a CC). Další část je věnována samotnému vývoji fw a především pak současným trendům posledních 5 let. Rozebrány jsou rovněž kromě jejich dopadů na bezpečnost i exter
APA, Harvard, Vancouver, ISO, and other styles
48

Kugler, Zdeněk. "Proxy firewall." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218057.

Full text
Abstract:
This diploma thesis deals with the topic of proxy servers and firewalls and considers other associated technologies and network techniques. It systematically describes the general issues of firewalls, with a special focus on proxy firewalls and their safety. Additional systems mentioned in this document are intrusion detection systems (IDS), antivirus systems and content control filters – as these are also connected with safety of networks, servers and workstations or with limiting various Internet sources. IDS systems can be typically supplemented with various additional applications or tools
APA, Harvard, Vancouver, ISO, and other styles
49

Sapia, Helton Molina. "Apoio à tradução da política de segurança para regras de firewall utilizando uma linguagem de modelagem visual : SPML2 /." São José do Rio Preto, 2016. http://hdl.handle.net/11449/140298.

Full text
Abstract:
Orientador: Rogério Eduardo Garcia<br>Banca: Paulo Lício de Geus<br>Banca: Milton Hirokazu Shimabukuro<br>Resumo: As telecomunicações e as redes de computadores permitiram a integração mundial, mas junto com os benefícios também surgiram problemas, como as ameaças a dados que trafegam pela rede, o que justifica o controle das comunicações, mais especificamente o controle sobre o tráfego de pacotes. O tráfego de pacotes entre redes deve ser protegido, de modo a evitar acessos não autorizados. A proteção deve ocorrer no perímetro de rede, fronteira entre uma rede interna e a Internet. O perímetr
APA, Harvard, Vancouver, ISO, and other styles
50

Inam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.

Full text
Abstract:
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero &amp; Llorente, 2012). A distinctive cloud is affected by different security issues such as Temporary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011). The pur
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!