1998
DOI: 10.1109/6.648669
|View full text |Cite
|
Sign up to set email alerts
|

Firewalls fend off invasions from the Net

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2002
2002
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Note that all process steps require a person with IT-Security expertise, which cooperates with various IT experts from the operations department. A firewall fits into the IT-Security process [14] as shown in Figure 1. In the Information-Security Management phase, the management defines a security policy based on company-wide security objectives.…”
Section: Firewall Lifecyclementioning
confidence: 99%
“…Note that all process steps require a person with IT-Security expertise, which cooperates with various IT experts from the operations department. A firewall fits into the IT-Security process [14] as shown in Figure 1. In the Information-Security Management phase, the management defines a security policy based on company-wide security objectives.…”
Section: Firewall Lifecyclementioning
confidence: 99%
“…As long as a computer is connected to another computer, there are always security risks [1]. In the past most firewalls have been implemented as software solutions running under an operating system and process or scan one particular protocol.…”
Section: Introductionmentioning
confidence: 99%