• Joseph Migga Kizza
Part of the Computer Communications and Networks book series (CCN)


The rapid growth of the Internet has led to a corresponding growth of both users and activities in cyberspace. Unfortunately, not all these users and their activities are reputable; thus, the Internet has been increasingly, at least to many individuals and businesses, turning into a “bad Internet.” Bad people are plowing the Internet with evil activities that include, among other things, intrusion into company and individual systems looking for company data and individual information that erodes privacy and security. There has, therefore, been a need to protect company systems, and now individual PCs, keeping them out of access from those “bad users” out on the “bad Internet.” As companies build private networks and decide to connect them onto the Internet, network security becomes one of the most important concerns network system administrators face. In fact, these network administrators are facing threats from two fronts: the external Internet and the internal users within the company network. So network system administrators must be able to find ways to restrict access to the company network or sections of the network from both the “bad Internet” outside and from unscrupulous inside users.


Security Policy Internet Protocol Intrusion Detection System Port Number Virtual Private Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kizza JM (2002) Computer network security and cyber ethics. McFarland Publishers, JeffersonGoogle Scholar
  2. 2.
    Karose J, Ross K (2000) Computer networking: a top-down approach featuring the internet. Addison-Wesley, BostonGoogle Scholar
  3. 3.
    Holden G (2004) A guide to firewalls and network security: intrusion detection and VPNs. Clifton Paark, Thomson LearningGoogle Scholar
  4. 4.
  5. 5.
    Panko RR (2004) Corporate computer and network security. Prentice Hall, Upper Saddle RiverGoogle Scholar
  6. 6.
    SANS Institute. Web application firewalls. SANS Institute InfoSec Reading Room.
  7. 7.
  8. 8.
    Adams JM. FTP server security strategy for the DMZ.
  9. 9.
    Semeria C. Internet firewalls and security. A technology overview.
  10. 10.
    Ranum MJ, Curtin M. Internet firewalls: frequently asked questions.
  11. 11.
    Graham R. Firewall forensics (What am I seeing?).

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.University of TennesseeChattanoogaUSA

Personalised recommendations