ABSTRACT

Companies are more vulnerable to security breaches than ever before with their mass migration to the Internet to conduct business with their clients and to connect remote offices and telecommuters to corporate resources. Passwords, the first line of defense and the simplest form of network security, were used to secure networks from unauthorized access before the Internet arrived. Handheld authenticators are inherently more secure, since they produce one-time passwords. They are used when logging on; the user enters both the generated password and a personal identification number (PIN). File Transfer Protocol (FTP) presents another security issue. FTP enables an Internet user to download a file, public domain software, documents, and images. A firewall should also provide a secure operating system to prevent attempts for seizure and control. A secure server network connected to a firewall interface enables users to isolate their application servers from the Internet. Firewall should also be easy to use through user transparency and graphical user interface.