AbstractNetwork connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable users to share files, exchange e-mail, and pool physical resources. Yet network connectivity can also be a risky endeavor, if the connectivity grants access to would-be intruders. The Internet is a perfect case in point. Designed for a trusted environment, many contemporary exploits are based upon vulnerabilities inherent to the protocol itself. In light of this trend, many organizations are implementing firewalls to protect their internal network from the untrusted Internet.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Romanian-American University in its journal Journal of Information Systems & Operations Management.
Volume (Year): 1 (2007)
Issue (Month): 1 (Winter)
firewall; network connection; risks; vulnerabilities;
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alex Tabusca).
If references are entirely missing, you can add them using this form.