Skip to main content

The Art of Web Filtering

Web Filters are designed to improve the security and productivity of a network, but as with anything else, it must be implemented correctly to work properly. In order to ensure a Web Filter is implemented successfully, several factors need to be considered. Why is Web Filtering beneficial to an organization? How does a Web Filter work and interact with the network? What can be done to secure or break a Web Filter? This paper is meant to help you understand these factors without focusing on a specific product.

1375 (PDF, 3.87MB)

8 Apr 2004
ByRobert Alvey
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Cloud Security Monitoring on AWS

Research Paper

Cloud services adoption is growing massively year over year. In most cases, moving to the cloud...

  • 8 Feb 2021

Firebase: Google Cloud's Evil Twin

Research Paper

Firebase allows a frontend application to connect directly to a backend database. Security wonks...

  • 8 Oct 2020
  • Brandon Evans

Compliance Benchmarks using Cloud Custodian

Research Paper

With the increased cloud adaption rate, many companies are looking for ready to use product...

  • 25 Sep 2020

Top 5 Considerations for Multicloud Security

Research Paper

The move to leveraging multiple public cloud providers introduces new challenges and opportunities...

  • 15 Apr 2020
  • Brandon Evans

Cybersecurity in the Age of the Cloud

Research Paper

The hand-selected resources in this eBook provide a well-rounded look at cybersecurity...

  • 21 Feb 2020
  • Frank Kim

Secure Internet Gateways: Backing Down from a Fight

Research Paper

When does a security agent become a double agent? On-premise corporate devices are protected by a...

  • 2 Nov 2018

Intrusion detection through traffic analysis from the endpoint using Splunk Stream

Research Paper

With technologies such as software-defined wide area networking (SD-WAN) and cloud operations, the...

  • 24 May 2017

Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017

Research Paper

Attackers are always changing their methods, but some cybersecurity trends are clear--and...

  • 20 Mar 2017

Moving Legacy Software and FOSS to the Cloud, Securely

Research Paper

As more organizations consider the benefits of cloud adoption and use of legacy or freeand open...

  • 28 Dec 2015

An Introduction To Securing a Cloud Environment

Research Paper

While Cloud services offer flexibility, scalability and economies of scale, there have...

  • 27 Nov 2012

Cloud Computing - Maze in the Haze

Research Paper

When Amazon announced its EC2 environment in August 2006, one might not have imagined the change in...

  • 18 Oct 2011

Following Incidents into the Cloud

Research Paper

The increased level of complexity which cloud computing has introduced to incident handling is not...

  • 1 Mar 2011

Step by Step Installation of a Secure Linux Web, DNS and Mail Server

Research Paper

This paper will show how the author configured a Linux based web and e-mail server for a small...

  • 8 Apr 2004

Secure OS Environments for Linux

Research Paper

In this paper I make a review of the main set of tools and resources available for Linux system...

  • 3 Jun 2003

The Consumer Desktop - The Weak Link in Internet Security and Why ISP's Are Uniquely Positio

Research Paper

The Internet community today is seeing a rapidly growing number of distributed denial-of-service...

  • 11 Mar 2003

Norton AntiVirus C.E 7.6

Research Paper

Since the Introduction of Norton Antivirus 7.x, Symantec have managed to created a truly remarkable...

  • 10 Oct 2001

Security Strengths and Weaknesses of Two Popular Web Servers

Research Paper

As the mediator between your business and the world the Web Server that you choose must be...

  • 19 Aug 2001

Using Snort v1.8 with SnortSnarf on a RedHat Linux System

Research Paper

To effectively implement system and network security, a multi pronged approach should be used....

  • 25 Jul 2001

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.