Firewall Evaluation Criteria - An evaluation

نویسنده

  • Lars Westerdahl
چکیده

In a time where more business is conducted over the Internet, the security of such systems, for instance electronic money transfer, becomes critical. A firewall serves as a frontline of the security measures that can be taken by an organisation in order to secure the integrity of a private network. This report describes methods of evaluating the security of a firewall. The existing methods on the market are presented and an evaluation of these methods is performed using a reference model, developed for this thesis. Two main categories of evaluation schemes are defined. Government schemes, that can produce a thorough evaluation and commercial schemes that are faster but does not offer such a rigor evaluation. As a tool for comparison, a framework is presented. The framework is an abstraction of security evaluation that preserves the necessary properties needed in order to gain acceptance. The master thesis is the result of study conducted at the Swedish Defence Research Agency in Linköping. iii Preface This report is the final stage of the computer science program at Växjö University. It is a 20p (full semester) master thesis conducted at the Swedish Defence Research Agency in Linköping during the spring of 2001. The report describes ways of measuring the security level of firewalls, as well as conducts an evaluation of known evaluation schemes. A special thanks to my tutors;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Security Components Anomalies Severity Evaluation and Classification

Security components such as firewalls, IDS and IPS, are the most widely adopted security devices for network protection. These components are often implemented with several errors (or anomalies) that are sometimes critical. To ensure the security of their networks, administrators should detect these anomalies and correct them. Before correcting the detected anomalies, the administrator should e...

متن کامل

Hospital Accreditation Surveyors' Evaluation Criteria in Iran

Background and Aim: Hospital accreditation is an external evaluation strategy used to improve the quality and effectiveness of services. Accreditation surveyors are among the important factors affecting the validity of accreditation results. Since the effectiveness of an accreditation system depends on its surveyors, the aim of this study is to identify the evaluation criteria of hospital accre...

متن کامل

A Fuzzy Approach for Projects Evaluation and Selection an Iranian Auto Manufacturer Case Study

Evaluating and selecting alternatives investment projects needs considering all relevant and important aspects. In traditional methods, the focus is just on tangible monetary criteria. Also in the traditional methods, either all the information’s about factors must be known precisely or sufficient objective data must be available for applying probability theory. In this paper, a combinative app...

متن کامل

BSM Security Auditing for Solaris Servers

Although Solaris servers might be inside the firewall and relatively secure, there are still chances for a hacker to break in, or chances for an ordinary user to attempt malicious activities. Therefore, security efforts have to be made to detect intruders and to prevent unauthorized actions. One of the security utilities for Solaris servers is called BSM (Basic Security Module), which is an aud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001