International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 101 | Views: 280

Review Papers | Information Security | India | Volume 6 Issue 12, December 2017 | Popularity: 6.2 / 10


     

Firewall and VPN Technology

Amruta Jagtap


Abstract: Corporations and organizations world-wide hinge on Firewall and VPN technologies for safeguarding their crucial resources and information while sharing their services on the Internet. This review paper briefly describes the types of firewall technologies and the VPN technologies along with the detailed working of the firewall and VPN technology. Firewall technology is used mainly to block or allow connections to applications hosted by corporations or organizations while VPN technology is used for secure communications between organizations located at several destinations across the world.


Keywords: packet filtering, encapsulation, firewall


Edition: Volume 6 Issue 12, December 2017


Pages: 1762 - 1765



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Amruta Jagtap, "Firewall and VPN Technology", International Journal of Science and Research (IJSR), Volume 6 Issue 12, December 2017, pp. 1762-1765, URL: https://www.ijsr.net/getabstract.php?paperid=ART20179139, DOI: https://www.doi.org/10.21275/ART20179139



Downloads: 246 | Views: 466

Information Security, India, Volume 8 Issue 11, November 2019

Pages: 95 - 101

Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)

S K. Niamathulla


Downloads: 221 | Views: 642

Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Downloads: 161 | Views: 322

Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G


Downloads: 148 | Views: 294

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C


Downloads: 144 | Views: 280

Information Security, Kenya, Volume 7 Issue 1, January 2018

Pages: 345 - 350

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Jairus E. Ounza, Samuel Liyala, Solomon Ogara


Top