Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012, International Journal of Strategic Information Technology and Applications
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.
IRJCS:: AM Publications,India
Beyond the Firewall: Understanding and Mitigating Cloud Security Challenges2024 •
In the ever-evolving landscape of digital infrastructure, the adoption of cloud computing has ushered in unparalleled opportunities for innovation but has also introduced complex challenges in securing sensitive data. This research, titled "Beyond the Firewall: Understanding and Mitigating Cloud Security Challenges," embarks on a comprehensive exploration of the multifaceted dimensions surrounding cloud security. The study delves into the intricacies of cloud security, transcending traditional boundaries set by firewalls. From elucidating the dynamics of shared responsibility models to dissecting the nuances of identity and access management, the research unravels the complexities inherent in safeguarding data within the expansive digital cosmos. It addresses elusive threats like data breaches and underscores the critical importance of adaptive strategies to navigate the ever-changing threat landscape. This research goes beyond theoretical discourse, offering actionable insights for organizations seeking to fortify their cyber defenses. It emphasizes the need for a paradigm shift in understanding security challenges in the cloud era and advocates for a proactive approach to mitigate potential risks. By illuminating the path "Beyond the Firewall," this study aims to empower stakeholders with practical knowledge, enabling them to establish robust security frameworks that resonate with the dynamic nature of modern digital ecosystems. Join us on this expedition into the heart of cloud security challenges, as we decipher the complexities and chart a course towards a more resilient and secure digital future.
2008 •
Abstract Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall directly depends on the quality of its policy (ie, configuration), ensuring the correctness of security policies is important and yet difficult. To help ensure the correctness of a firewall policy, we propose a systematic structural testing approach for firewall policies.
2003 •
Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel methodology for analyzing vulnerabilities in Internet firewalls.
Even after the adoption of network security policies and practices, unauthorized intrusion occurs. It is an attack in which attacker gets access to the system by means of different hacking and cracking techniques. Firewall is hardware-software based network security system that uses rules to control incoming and outgoing network packet. A firewall controls access to the resources of a network through a positive control model. There are various traditional firewalls like Packet Filters, Application-level Gateways and Circuit-level Gateways which has certain pros and cons. To overcome disadvantages the traditional firewall, next generation firewalls are introduced. This paper gives the empirical study of tradition firewalls, and its evolution to Next Generation firewall like NGFW, UTM, Threat focused its features and advantages. Manisha Patil | Savita Mohurle"The Empirical Study of the Evolution of the Next Generation Firewalls" Published in International Journal of Trend in...
International Journal of Internet Technology and Secured Transactions
A review of testing cloud security2018 •
International Journal of Science and Research (IJSR)
Enhancing Business Operations: Importance and Methodologies of Cloud Computing Security Testing2020 •
Cloud computing has revolutionized the way businesses operate by providing scalable, ondemand access to computing resources. However, the adoption of cloud services introduces new security challenges. This report presents the importance of cloud computing security testing, outlines methodologies used, describes an experimental setup, discusses results, and proposes a framework to enhance security. It concludes with best practices and a discussion on future directions.
With the rapid growth of Internet, the amount of malicious codes is exploding. Some security software vendors provide new cloud-based safeguard software for client users. These software, as part of Internet ware, consist of many modules with different functions and Internet behaviors. The Trojan scanning module, for instance, is based on cloud scanning function, which is achieved by collecting a large number of suspicious files on users' hosts and scanning them in remote cloud platforms. While providing security, they also bring a serious problem of user privacy. In this paper, we use black box testing method to analyze the network behavior of four safeguard software, especially the Trojan scanning module based on cloud scanning function. In specific, we conduct extensive experiments to examine the network behaviors of the major function modules used by these safeguard software. In this paper we present a reasonable network behavior model that can help the safeguard software to protect users' privacy. One way of looking at our contributions is the network behavior comparison and analysis of four safeguard software which are widely used in China. And the experimental results validate our claims either.
—The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. In particular, we articulate a grid-based representation technique, providing an intuitive cognitive sense about policy anomaly. We also discuss a proof-of-concept implementation of a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME). In addition, we demonstrate how efficiently our approach can discover and resolve anomalies in firewall policies through rigorous experiments.
2007 IEEE International Conference on Network Protocols
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing2007 •
2023 •
Bulletin of the History of Medicine
The Neglected Role of Buddhism in the Development of Medicine in Late Imperial China Viewed through the Life and Work of Yu Chang 喻昌 (1585–1664)2020 •
Journal of Organizational Behavior
Positive emotions, negative emotions, or utility of discrete emotions?2012 •
Rivista Biblica
Book Review of Arzt-Grabner – Kloppenborg – Kreinecker, More Light from Ancient East. Understanding New Testament through Papyri2023 •
2023 •
VIOLENCIAS, RESISTENCIAS Y ESTRATEGIAS. ANÁLISIS DE LA SITUACIÓN DE VIOLENCIA EN MÉXICO
Neoliberalismo autoritario, protesta social y represión estatal en Ecuador (2017-2022)2014 •
Tij S Research Journal of Science It Management Rjsitm
Growth Responses of Some Fodder Tree Species on Arbuscular Mycorrhizal Fungi2014 •
Open Access Emergency Medicine
Perioperative Adverse Outcome and Its Predictors After Emergency Laparotomy Among Sigmoid Volvulus Patients: Retrospective Follow-Up Study2023 •
2010 •
2005 •
2020 •