Computers and the Internet are now a familiar part of our lives. You may not see them often, but they are involved in some way in most of our daily activities in the business, educational institutions, and government. Without the support of any of these tools, we would be able to handle the overwhelming amount of information that seems to characterize our society. But the problem of security limits the integrity of information and computer systems. More people need to know the use of computers and the protections that are daily offered for the safe handling of information (Roland, 2001).
The shortcomings in security issue are not known for all users of the network and therefore we do not know how to protect the vulnerabilities that are increasingly connecting to this network. It is precisely at this point that this research is based and we intend to present one of the most used tools in the protection of computer equipment when connected to the Internet.
The primary objective of this research is to provide an understanding of how network security protection can help a firm to keep its information safe from potential losses. The research builds upon extensive research and literature related to network security and protection. The paper gives a comprehensive account of some most important security tools (like firewalls) which can help companies to secure their information networks from unauthorized use. A brief account of challenges faced in Network Security Management is also provided to identify the potential areas for research (Roland, 2001)
. Specifically, The objective here is to determine the most common methods used today for attacks on computer security (confidentiality, integrity and availability of information) of an organization or company, and to determine how we can deploy weapons for defense, and how we can provide network protection by solutions available for prevention, detection and repair of hacker's or cracker's damage.
In this research the term network security refers to protection against attacks and intrusions on corporate resources by intruders who are not allowed access to these resources. Safety is always on the type of services we provide to authorized users, as defined in the security policy of the company. We should start that this research by first defining the basic parts of most interest to this research paper.
WAN
WAN (World Area Network) is a computer network with worldwide coverage. It is the most common is the Internet. Second, is LAN (Local Area Network) which is a local medium-sized network called because it is limited to a small geographic area and is usually used by private, public, educational, etc.. These two networks come to interact using a set of data communication protocols.
TCP / IP
TCP / IP is the most common protocols. Its initials are Transmission Control Protocol and Internet Protocol (Transmission Control Protocol / Internet Protocol). These routing protocols allow information from one machine to another, delivering mail and news, and even the remote connection.
Firewall
A firewall is a system that is responsible for strengthening access policies between networks. Today, we must submit to constant care for different attacks ...