2013
DOI: 10.14257/ijsia.2013.7.6.36
|View full text |Cite
|
Sign up to set email alerts
|

Performance and Information Security Evaluation with Firewalls

Abstract: Firewalls are an essential part of any information security system being the first defense line against security attacks. The sea-saw effect between firewalls and network performance is most concerning to network users; where strict security settings result in weak network performance and permeant security settings allow for a stronger one. Hence, evaluating firewall platforms and their impact on network performance is important when assessing the effectiveness of network security. In this paper, we present an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
14
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 13 publications
1
14
0
Order By: Relevance
“…Usually, medium and big size companies are exercising penetration testing to prevent outside and inside attacks that would cost more than doing penetration test. A firewall, an antivirus or sensors that are all over the network may not prevent cyber attacks if they do not really know the weakness and vulnerabilities of their system or network [36]. Finally, it is also critical for the security protocols to adopt lightweight cryptographic techniques or use security levels with different ciphers' complexity [32] [33][34] [35].…”
Section: Results and Discusionmentioning
confidence: 99%
“…Usually, medium and big size companies are exercising penetration testing to prevent outside and inside attacks that would cost more than doing penetration test. A firewall, an antivirus or sensors that are all over the network may not prevent cyber attacks if they do not really know the weakness and vulnerabilities of their system or network [36]. Finally, it is also critical for the security protocols to adopt lightweight cryptographic techniques or use security levels with different ciphers' complexity [32] [33][34] [35].…”
Section: Results and Discusionmentioning
confidence: 99%
“…Security protection mechanisms increase the system loading an impact on the overall performance. Hayajneh et al (2013) investigated the impact of the evaluation of information security protection mechanism towards overall network system performance. Besides, TTAT focuses on the effectiveness of information security with coping appraisal.…”
Section: H1: the Drivers Of Users' Perceived Information Security Promentioning
confidence: 99%
“…Thus, the system is not efficacious in terms of using energy, particularly for weak sensors. Hajajneh et al proposed in [3] a cryptographic system that secures multimedia application in FPGA. The goal of this work is to perform authentication and encryption using a Cipher Block Chaining Message Authentication code protocol (CCMP) and a counter (CTR) protocol.…”
Section: Introductionmentioning
confidence: 99%