Open Access Open Access  Restricted Access Subscription Access

Importance of Firewalls in the Security of Network

Aman Jain, Neeraj .


Cyber security is crucial in the realm of information technology. In the current context, data security has grown to be a major concern. When it comes to cybersecurity, the word which springs to mind is “cybercrime”, which occurs in large numbers on a regular basis. To tackle cybercrime, several governments and organizations are employing a range of tactics. Many individuals are still concerned about cybersecurity, despite several measures. This research focuses and, in particular, cyber terrorism. It examines their most relevant implications. The threat of has the potential to cost businesses billions of dollars. The study also looks at the components and goals of cyber terrorism. This report also offers two cybersecurity case studies. It also covers a variety of cyber advance security and cyber remove terrorism solutions. Access control, antivirus software, application security, network analytics, various forms of network-related security (endpoint, online, wireless), firewalls, VPN encryption, and more are all included in network security. Network traffic is managed by firewalls using pre-established security rules. Firewalls are an essential component of daily computing since they block malicious traffic. Firewalls, particularly Next Generation Firewalls, which concentrate on thwarting malware and application-layer attacks, are crucial to network security.


Cyber security, cyber space, terrorism, information security, next generation firewalls

Full Text:



Sophos. James Lyne. Eight Trends that are Changing Network Security. [Online]. Available from

Nina Godbole, Sunit Belapure. Cyber Security (with CD): Understanding Cyber Crimes, Computer Forensics and Legal Perspectives. New Delhi: Wiley; 2011.

Hena Iqbal, Ghassan Al-Utaibi, Om Prakash Bohra. The Reality of Technologies for Cyber Security Challenges. Int J Recent Technol Eng. 2020; 9(1): 170–175.

Panda MediaCenter. Panda Labs annual Report: 2012 Summary. [Online]. Available from

Song C, Sudirman S, Merabti M, Llewellyn-Jones D. Analysis of digital image watermark attacks. In 2010 7th IEEE Consumer Communications and Networking Conference. 2010 Jan 9; 1–5.

Liu AX, Gouda MG. Diverse firewall design. IEEE Trans Parallel Distrib Syst. 2008 Jul 29; 19(9): 1237–51.

Mukkamala PP, Rajendran S. A survey on the different firewall technologies. International Journal of Engineering Applied Sciences and Technology (IJEAST). 2020; 5(1): 363–5.

Desai MS, Richards TC, von der Embse T. System insecurity–firewalls. Information management & computer security. 2002 Aug 1; 10(3): 135–9.

Wu CH, Irwin JD. Introduction to computer networks and cybersecurity. CRC Press; 2016 Apr 19.

Chan H, Perrig A. Security and privacy in sensor networks. Computer. 2003 Oct 14; 36(10): 103–5.


  • There are currently no refbacks.

Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517