NORMA eResearch @NCI Library

Building Firewall Application To Enhance The Cyber Security

Morthala, Venkatesh Reddy (2022) Building Firewall Application To Enhance The Cyber Security. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
PDF (Master of Science)
Download (3MB) | Preview
[thumbnail of Configuration manual]
PDF (Configuration manual)
Download (2MB) | Preview


Today, almost every business uses the internet for better communication, from individuals and partners, which raises many concerns about the safety of the network or computer connected to Internet. Internet security has become a major problem with existing devices. It also seems that stopping bad things will not affect us all. So, this study explores how to use a firewall to protect the internet by exploring different technologies and types of firewalls, as well as how it can help protect the internet. The settings set for the firewall and how to turn it off will also be discussed. It is suggested that the use of firewalls has played an important role in preventing widespread security threats on the internet, which should provide a solution to the problem and make it more efficient, safer internet. However, from this study, I suggest that the safety of the internet should be improved so that the security and access of Internet users is not compromised by neglecting or compromising themselves. perdition or fear.This information is about rumours about the use and configuration of a web application firewall that protects the purpose of the application by supporting incoming requests and their restrictions by the program. These principles, in turn, are mastered by users of traffic through the application. Because many web applications, including those operated by the government, are generally easy to use, it is important to quickly introduce new procedures to prevent unauthorized access to data. Learn Apps WebWall offers flexible, customizable and easy-to-submit application solutions. However, there are concerns about processing data used to learn systems that may in some cases correctly violate firewall rules. These concerns were raised by commentators.

Item Type: Thesis (Masters)
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Tamara Malone
Date Deposited: 22 Dec 2022 12:17
Last Modified: 22 Dec 2022 12:17

Actions (login required)

View Item View Item