Article

System insecurity - Firewalls

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Before choosing a firewall architecture, a company must have the right mind set regarding the threat. The purpose of this paper is to provide an introduction to firewall concepts and help develop this mind set.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Jika paket data memenuhi kriteria yang ditentukan, firewall akan memperbolehkan paket tersebut untuk masuk ke jaringan internal. (Desai et al., 2002) Penerapan firewall sangat penting bagi setiap jaringan karena dapat melindungi sistem dari serangan eksternal yang merugikan. Firewall memastikan bahwa hanya informasi yang sah yang dapat masuk ke dalam jaringan dan membatasi akses yang tidak sah. ...
Book
Full-text available
Buku ajar "Rekayasa Perangkat Lunak: Kajian Teoretis dan Praktis" ini merupakan sumber daya komprehensif yang dirancang untuk menyediakan panduan menyeluruh bagi mahasiswa dan praktisi dalam bidang rekayasa perangkat lunak. Terdiri dari 14 bab, buku ini menawarkan pandangan mendalam tentang konsep, metodologi, alat, teknologi, dan penerapan praktis rekayasa perangkat lunak. Bab pertama memulai dengan pengenalan dasar rekayasa perangkat lunak, sejarahnya, dan tantangan yang dihadapi dalam pengembangan, disertai dengan kajian integrasi antara sains dan Islam, menunjukkan pendekatan unik buku ini dalam menghubungkan ilmu pengetahuan dengan nilai-nilai keagamaan. Metodologi pengembangan perangkat lunak, yang merupakan tulang punggung dalam bidang ini, dibahas secara rinci dalam Bab 2, mulai dari metodologi waterfall hingga Agile. Buku ini juga mengeksplorasi alat dan teknologi yang digunakan dalam pengembangan perangkat lunak, termasuk lingkungan pengembangan terpadu, sistem kontrol versi, alat debugging, dan alat profil. Bab ini memastikan pembaca memahami perangkat dan teknologi penting yang digunakan dalam pengembangan perangkat lunak kontemporer. Pemrograman berorientasi objek, analisis dan desain sistem, serta pengujian perangkat lunak, dijelaskan secara mendalam dalam bab-bab berikutnya, memberikan dasar yang kuat bagi pembaca untuk memahami dan menguasai konsep-konsep kunci. Buku ini juga menyentuh aspek manajemen proyek, keamanan perangkat lunak, rekayasa antarmuka pengguna, serta rekayasa perangkat lunak berbasis web, mobile, cloud, dan Al. Setiap bab menggali ke dalam aspek-aspek spesifik dan kontemporer dari rekayasa perangkat lunak, menawarkan wawasan berharga dan terkini. Bab terakhir membahas aplikasi rekayasa perangkat lunak dalam industri dengan studi kasus dan prospek karir, memungkinkan pembaca untuk menghubungkan pengetahuan teoretis dengan praktik industri. Secara keseluruhan, buku ini memberikan pengalaman belajar yang menyeluruh dan mendalam, menggabungkan teori dan praktek dengan unik, dan memastikan bahwa pembaca tidak hanya mendapatkan pengetahuan teoretis yang kuat tetapi juga pemahaman aplikatif yang relevan dengan tren dan kebutuhan industri terkini. Pendekatan buku ini dalam mengintegrasikan sains dan Islam di setiap bab menambahkan dimensi yang menarik, memperluas perspektif pembaca dalam melihat rekayasa perangkat lunak.
... According to Desai, Richards and Embse (2002), the firewall is normally an intermediate system between secure internal networks and less secure external networks. Firewall intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. ...
Conference Paper
Full-text available
There is a lack of awareness towards managing and protecting digital data in the Land Registration System (LRS) under the Ministry of XYZ. The data which has been carelessly managed can be classified as a very important data in Malaysia since cover all concerning. It so forth the data about land in Malaysia, like the name of land owner, land size, type of land and others. All these data had been stored in one server called LRS Database Server which functions like a data warehouse for each land district in Malaysia. However, the digital data security control that being implemented for the system is not fully execute, as a result the volatile information is exposed to irresponsible people. This study focuses on the security awareness and it implementation towards Land Registration System (LRS) data warehouse in land district office and as well as land state office in PQR.
Article
Fraud has emerged as an undesirable offshoot of human greed and pressure to perform in growing corporate world. It has led to erosion of stakeholders’ confidence across the globe. Now, they see the annual reports and other corporate filings with scepticism. Despite increasing instances of fraud, the anti-fraud mechanism of the business organisations is not up-to-date. The present study aims to examine the effectiveness of fraud detection and prevention methods used by corporate sector. A survey of 336 auditors seeking their perception about effectiveness of various anti-fraud methods has been conducted. The findings reveal that corporate governance is the most effective tool against fraud. Use of information technology, timely audit, regular inspection and corporate policies and procedures, also, play a vital role in curbing fraudulent practices in an organisation. Thus, the findings suggest that expenditure on effective anti-fraud methods should not be viewed as an expense; instead, it must be considered as an investment as it saves from the potential losses due to fraud and damage to business stability, revenue and image.
Article
Full-text available
The lack of awareness towards information security control will result in a leak of organization's vital information. Many organizations nowadays feel less important to implement a security measure towards their digitalized data besides they do not know the correct way to manage and protect the data. When the data is not being protected, it will give an opportunity to irresponsible people to change it according to their needs. There are few cases that occur in Malaysia where the important data in organizations had been changed in order to fulfill the irresponsible people's needs. This study focuses on the security awareness and it implementation towards Land Registration System (LRS) data warehouse in land district office and as well as land state office in PQR. In addition, this study identified the weak point of security at the data warehouse. Therefore, recommended solutions to solve the problem are stated.
Article
Despite the remarkable development in the use of inter-organisational systems (IOS) in supply chain management, there is still limited knowledge regarding the factors that motivate their adoption in manufacturing. This study investigates the role of structural elements of supply chain management as antecedents of inter-organisational systems (IOSs) adoption. More specifically, it explores the extent to which variables including foreign supply, direct material cost, number of suppliers, and supplier collaboration practices explain variation in the adoption of dyadic IOSs including electronic data interchange (EDI) and extranets, and multilateral IOSs including internet auctions, liquid exchanges and private marketplaces. The study involves statistical analysis of data from 219 manufacturers of fabricated metal products, machinery, and equipment from 13 countries. The results indicate that dyadic IOSs relate to high-volume transactions with international suppliers, while multilateral IOSs relate to low-volume transactions with a limited number of suppliers.
Article
The research report focuses on the issue of critical factors in relation to the implementation of information security (InfoSec). Several authors have proposed ways of implementing critical factors of InfoSec, suggesting particular methodologies to achieve them. In this paper the researchers summarise the advice of different authors and identify critical factors in the InfoSec implementation. This leads us to an analysis of the generic factors of InfoSec implementation. The resulting critical factors model provides a framework for the analysis of actual organisational practices.
Article
Purpose The purpose of this paper is to make explicit why security needs to be viewed as a core activity and why senior management need to view security from a holistic perspective. Reference is made to various activities carried out by computer hackers and the costs associated with computer related crime. Design/methodology/approach A literature review was undertaken and a conceptual security model was produced. The key elements of the activities associated with security were highlighted and the links between the activities were made clear. Findings Organized criminal syndicates and international terrorist groups are increasing their level of activity. Senior managers within companies need to put in place an intelligence and security strategy to counter the activities of criminals and terrorists. Furthermore, senior managers will in the future have to work more closely with law enforcement representatives and industry representatives. They will also have to develop an appreciation of the strategic intelligence objectives of various governments. There is also evidence that senior management need to pay greater attention to identifying future threats associated with advances in internet technology. Research limitations/implications More attention will need to be given to how facilitating technology such as the internet is providing computer hackers and criminals with ways to either disrupt business activities or extend the range of criminal activities that they are engaged in. Practical implications Senior management will need to refocus on the capability of staff vis‐à‐vis corporate intelligence and security work. The learning organization concept can be embraced and can be used to assist staff to identify the advantages associated with effective knowledge management. Scenario analysis and simulation exercises can be used to train staff in emergency work, and disaster management and prevention. Originality/value A diverse range of topics is covered and integrated into a security‐oriented context. Attention is focused on the link between organized criminal syndicates and international terrorist groups, and why senior managers in companies need to be engaged in disaster management recovery planning. The material highlights why senior managers in companies need to develop business contingency plans and embrace the counterintelligence concept.
Conference Paper
It was proven again and again that the most robust system of security built on strong encryption and authentication schemes can be compromised innocently or purposefully by the people who develop it, implement it, use it, or in charge of managing it. In an environment where IT security is built around technology alone, harm can still be done through criminal attacks or lax in the company 's rules for securing their IT infrastructure through social engineering and deceptive acts. The focus in this research is on people, both employees of the company and those interacting with it from the external environment. We have the technology to monitor everything an employee does using the company IT infrastructure, but we are missing efficient tools by which we can monitor this infrastructure in real time while mining for traces of ongoing, or hints of future criminal activities.
Article
The wide use of the computer networks and the Internet has increased the concern for the security and protection from hostile activity. Many organizations are using additional protective measures in the form of intrusion detection systems (IDS) to monitor the activity on the network to detect the unusual, and potentially hostile activity. Intrusion prevention systems (IPS) block the attacks in real time and provide an additional layer of security, and operate online by matching network activity patterns to the signatures of known modes of attack. A new approach called Active Intrusion Prevention (AIP) is emerged that examines all the activities on the network, and provides the requested data with an early and accurate identification, prior to the actual break-in and protection from all types of attacks. AIP systems are analyzed with predictive models and logit regression analysis and then applied to enhance computer network security.
Article
Purpose The paper addresses the contemporary and very important area of electronic information (EI) management – the ethical dimension and implications. Specifically, this paper aims to analyze EI activities and management practices, the ethical dilemmas and implications; to relate effectiveness in EI ethics activities in the context of organizational ethics policy and practice, and to suggest a framework for handling ethical dilemmas in managing the major EI activities. Design/methodology/approach A survey of mid‐ and first‐level managers in six industries was conducted. Subjects were asked to describe organization practices in 11 areas of ethics policy application. Respondent firms were compared according to high and low numbers of ethical safeguards: an ethics code, a credo or values statement, written ethics policies – general and specific, ethics training and development, ready access to ethics guidelines at all levels, and a cohesive, supportive ethical culture. Findings EI ethics need to be addressed in the context of the organization's policies and practices. This extends to specific EI activities as well, where the ramifications of misbehavior – or upright behavior – are magnified. Practical implications The organization that invests in ethics safeguards provides the needed supports and reaps substantial returns in employee morale, performance and ultimately, the bottom line – profits. In this area of EI management, the atmosphere of trust that results lightens the burden for all involved. Originality/value This research has a value that is relevant to the current issues related to the privacy and security of information.
Conference Paper
Building a secure e-business environment becomes top critical to e-business applications, however, security can't be attained by simply applying security protection systems like firewalls, I S or anti-virus. This paper develops a security blueprint for e-business applications based on the three-tier e-business architecture. The security blueprint provides best practices in general, including security controls layered from physical access, network communication, operating system, to application and management processes staged from planning, deployment, administration, to auditing. Moreover, the paper discusses the applicability of this security blueprint using a Singapore multinational corporation as a case study. Also discussed are security control analyses, management process analysis, and cost benefits analysis
Article
This conference proceedings contains 4 papers. The titles of the papers are: surveillance of foodborne infections in England and Wales; natural toxicants; additives, contaminants and processing; and food gels - roles played by polysaccharides.
Article
As Web proxies become increasingly widespread, there is a critical need to establish a benchmark that can compare the performance of different proxy servers and predict their performance in practice. In this paper, we describe the Wisconsin Proxy Benchmark (WPB) and the performance comparison of four proxy software using the benchmark. Using the benchmark, we also study the effect of more disk arms on proxy performance, and the effect of low-bandwidth modem client connections. We find that proxy implementations differ in their performance characteristics significantly. In addition, though disk arms appear to be the bottleneck limiting proxy throughput, adding extra disks does not result in performance improvement for every proxy implementation. Finally, we find that the latency advantage of caching proxies vanishes in the presence of modem connections.
Conference Paper
The NAI Labs Advanced Security Proxies (ASP) project is investigating software architectures for high-performance firewalls to enable the secure use of next generation networks. The project objective is to demonstrate an architecture and implementation in which protocol-specific proxies control when data transmission is allowed across the firewall, but which allows the proxy a range of options in determining how that data transits the firewall. By employing proxies that selectively use a range of lower-level protocol stack features, this novel architecture provides higher performance and greater flexibility in determining exactly what information the proxies examine. These decisions are made at the granularity of each proxied connection. We describe the firewall design and implementation and report preliminary experimental results using Fast Ethernet
Article
Using cryptography and cryptographic protocols to check software integrity, provide communication confidentiality, and ensure transaction nonrepudiation is often viewed as providing software security. Unfortunately, cryptography does not provide integrity. Cryptographic technologies and protocols are powerful tools, but they rely on the trust and integrity of the platform supporting and implementing them. Such cryptographic defenses do not hinder attacks that compromise the platform's integrity or take advantage of its lack of integrity. Software- and system-architecture-based approaches can provide acceptable security in servers and business installations. The lack of integrity in most clients (particularly PCs relying on an operating system that does not provide a ring-protected kernel) means that client defenses must rely on additional hardware for an appropriate mix of user authentication, transaction verification, and communications management.
A suite new answer to Internet security
  • R. Santalesa
Next gen help create faster firewalls
  • T. Greene
Safety and the Internet
  • M. Hansen
Property rights on an Internet
  • S. Kokka
To have and have NAT: managing though the firewall
  • L. Liebmann
Defending the security of the accounting system
  • M. Luehlfing