Burning money with firewalls
Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Fir...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
South African Institute of Computer Scientists and Information Technologists
2015-07-01
|
Series: | South African Computer Journal |
Subjects: | |
Online Access: | http://sacj.cs.uct.ac.za/index.php/sacj/article/view/322 |
id |
doaj-2eddf36860d344fc9bcafe4995cfe0f7 |
---|---|
record_format |
Article |
spelling |
doaj-2eddf36860d344fc9bcafe4995cfe0f72020-11-25T02:11:43ZengSouth African Institute of Computer Scientists and Information TechnologistsSouth African Computer Journal1015-79992313-78352015-07-0105610.18489/sacj.v56i1.322134Burning money with firewallsRalf C. Staudemeyer0James Connan1University of South AfricaRhodes UniversityProtecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of.http://sacj.cs.uct.ac.za/index.php/sacj/article/view/322SecurityFirewalls |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ralf C. Staudemeyer James Connan |
spellingShingle |
Ralf C. Staudemeyer James Connan Burning money with firewalls South African Computer Journal Security Firewalls |
author_facet |
Ralf C. Staudemeyer James Connan |
author_sort |
Ralf C. Staudemeyer |
title |
Burning money with firewalls |
title_short |
Burning money with firewalls |
title_full |
Burning money with firewalls |
title_fullStr |
Burning money with firewalls |
title_full_unstemmed |
Burning money with firewalls |
title_sort |
burning money with firewalls |
publisher |
South African Institute of Computer Scientists and Information Technologists |
series |
South African Computer Journal |
issn |
1015-7999 2313-7835 |
publishDate |
2015-07-01 |
description |
Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of. |
topic |
Security Firewalls |
url |
http://sacj.cs.uct.ac.za/index.php/sacj/article/view/322 |
work_keys_str_mv |
AT ralfcstaudemeyer burningmoneywithfirewalls AT jamesconnan burningmoneywithfirewalls |
_version_ |
1724913071464382464 |