12 March 1996 Internet firewalls: questions and answers
Author Affiliations +
Proceedings Volume 2616, Information Protection and Network Security; (1996) https://doi.org/10.1117/12.232269
Event: Photonics East '95, 1995, Philadelphia, PA, United States
Abstract
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
© (1996) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Keith Ker, Keith Ker, } "Internet firewalls: questions and answers", Proc. SPIE 2616, Information Protection and Network Security, (12 March 1996); doi: 10.1117/12.232269; https://doi.org/10.1117/12.232269
PROCEEDINGS
13 PAGES


SHARE
RELATED CONTENT

Defense and security of a wireless tactical network
Proceedings of SPIE (August 28 2001)
Honeynets
Proceedings of SPIE (February 21 2001)
A case of reliable remote functionality
Proceedings of SPIE (July 15 2008)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)

Back to Top