Essays about: "Cisco ASA Firewall"
Found 4 essays containing the words Cisco ASA Firewall.
-
1. Improving the Cyber defence of an organisation based on IP Geolocation and security appliances
University essay from Högskolan Väst/Avdelningen för Matematik, Data- och LantmäteriteknikAbstract : As advancement and usage of data communication has increased exponentially on a global scale, with a devastating exposure to attacks and varying security threats to home offices as well as to large enterprises, there is always a need for enhanced network protection. The IT department of the company OneDefence, located in western Sweden, was chosen for the thesis and based on the stated information from the organisation, aims were set on how to improve their network defence capabilities. READ MORE
-
2. Firepower, Next Generation firewall from Cisco
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : As there is more and more threats on the internet the need for security is more crucial than ever for the companies to look into their solutions to protect their information. To be able to see how an attack works, we discus and show how an attack is progressing in this thesis we compare the difference between traditional and Next Generation firewalls. READ MORE
-
3. Performance Evaluations of Cisco ASA and Linux iptables Firewall Solutions
University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Abstract : A firewall is an essential component to provide network security and traffic control. It is widely used to prevent illegal accesses to private or corporate networks from external unsafe source like Internet. Firewalls are basically classified into two types, hardware firewalls and software firewalls. READ MORE
-
4. A comparative firewall study in terms of performance, security and configuration
University essay from Institutionen för ekonomi och itAbstract : The goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. READ MORE