IDEAS home Printed from https://ideas.repec.org/a/rau/jisomg/v1y2007i1p95-100.html
   My bibliography  Save this article

Firewall Management

Author

Listed:
  • Radu Constantinescu

    (Academy of Economics Studies)

Abstract

Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable users to share files, exchange e-mail, and pool physical resources. Yet network connectivity can also be a risky endeavor, if the connectivity grants access to would-be intruders. The Internet is a perfect case in point. Designed for a trusted environment, many contemporary exploits are based upon vulnerabilities inherent to the protocol itself. In light of this trend, many organizations are implementing firewalls to protect their internal network from the untrusted Internet.

Suggested Citation

  • Radu Constantinescu, 2007. "Firewall Management," Journal of Information Systems & Operations Management, Romanian-American University, vol. 1(1), pages 95-100, Winter.
  • Handle: RePEc:rau:jisomg:v:1:y:2007:i:1:p:95-100
    as

    Download full text from publisher

    File URL: http://www.rebe.rau.ro/RePEc/rau/jisomg/WI07/JISOM-WI07-A18.pdf
    Download Restriction: no

    References listed on IDEAS

    as
    1. Jean-Claude Cosset & Jean-Marc Suret, 1995. "Political Risk and the Benefits of International Portfolio Diversification," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 26(2), pages 301-318, June.
    2. Sohnke M. Bartram & Gunter Dufey, 2001. "International Portfolio Investment: Theory, Evidence, and Institutional Framework," Finance 0107001, EconWPA.
    3. Nahum Biger, 1979. "Exchange Risk Implications of International Portfolio Diversification," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 10(2), pages 63-74, June.
    Full references (including those not matched with items on IDEAS)

    More about this item

    Keywords

    firewall; network connection; risks; vulnerabilities;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:rau:jisomg:v:1:y:2007:i:1:p:95-100. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alex Tabusca). General contact details of provider: http://edirc.repec.org/data/firauro.html .

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.