StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Is a Firewall - Report Example

Cite this document
Summary
This report "What Is a Firewall" shed light on internet firewall security and how a good firewall can protect a person from malware, Trojan horses, and other undesirable viruses. There are a lot of problems that firewalls usually face, the desirable services are often blocked by firewalls…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
What Is a Firewall
Read Text Preview

Extract of sample "What Is a Firewall"

?Client’s 18 May Introduction The invention of the internet has made life unimaginably easier, one can shop online, transfer moneyonline, book movie tickets online, book airline tickets online and in addition to this complete a host of other important tasks with just a few clicks. Websites like Amazon and Ebay have taken online selling to the next level. When there are so many pros, one ought to fine cons too. There have been several instances of hacking in the past; recently the American intelligence website was hacked, credit card numbers are stolen on a regular basis. Considering all these cons, one must ensure that a good firewall is in place to keep the hackers at an arm’s length, keeping them at bay is an arduous task. This paper will shed light upon internet firewall security and how a good firewall can protect a person from malware, Trojan horses and other undesirable viruses. “The term "fire wall" originally meant, and still means, a fireproof wall intended to prevent the spread of fire from one room or area of a building to another. The Internet is a volatile and unsafe environment when viewed from a computer-security perspective, therefore "firewall" is an excellent metaphor for network security.” (What is a firewall?) Firewall is not something general, it means several specific things and it is supposed to do several important things to ensure that a user is safeguarded against attacks. Packet filtering is perhaps the most important job of a regular firewall. All the internet activities like downloads, chats and so on are done in packets, and these packets contain information. Firewall must ensure that these packets are either allowed or disallowed based on the source of the internet protocol address known as the IP address. The destination port of these packets is also very important, the firewall is supposed to allow or disallow these packets purely on the basis of their destination port. Firewall must follow a protocol and allow or disallow packets or information based on the set protocol. This method of packet filtering is highly effective against malware and other dangerous attacks but this is not a foolproof plan. All traffic can be blocked by a firewall which does not make much sense; it should allow certain packets which are safe for the user to receive. It has its weaknesses like it becomes very difficult for a basic firewall to detect spoofing which means the information contained in the packets is falsified. Allowed packets may contain a bug which can retrieve a password and cause unwanted actions, a basic firewall is vulnerable to these dangers. Circuit relay is another type of firewall which provides enhanced security, application level gateway is perhaps the most advanced of all and provides even better security. Static Packet Filtering: “Static packet filtering is a firewall and routing capability that provides network packet filtering based only on packet information in the current packet and administrator rules.” (Statistic Packet Filtering) Static packet filtering is based on the following important things: The administrator defines rules. The allowed ports and IP addresses are set by the administrator and only the allowed ports are allowed to send and receive packets. The transport layer contents, the network and the packet contents are all determined by the administrator. Better level of security is provided by the dynamic packet filtering. Static packet filtering does not look at the contents closely, on the contrary dynamic packet filtering screens contents very closely, previous connection states are also considered by dynamic packet filtering which static packet filtering fails to do. The packet headers are very important under static packet filtering, the information stored in the headers determines whether packets should be allowed or dropped. These headers are compared against the control policy which is set by the administrator. Below is an illustration which presents the same concept very comprehensively. (Static Packet Filtering, 2011) SPI for Main Border Firewalls: SPI stands for Stateful Packet Inspection. The SPI is the most dominating technique when it comes to main border firewalls. Its flexibility is one of its biggest pros; it is capable of handling almost anything like ICMP flow, UDP and TCP. If only one FW is used then this is the best choice, no other thing can ever come close to it when only one FW is used. Some SPI are more than capable of doing application-level filtering. It is very simple and very reasonably priced; it is least expensive when it comes to security and safety measures. It has a few cons too; the user may find that the ACL rules may be too complex. The ongoing connections are filtered easily and quickly, this is another of its pros. It could take a lot of time if the connection table has grown large. It is arguably the most cost effective. A standard operating system is good enough to ensure its smooth functioning. Network Address Translation (NAT): An entire group of computers can be represented by a single IP address thanks to NAT; NAT allows a single device to act as an agent between a local network and the internet. It is ideal to use NAT these days because there is a severe shortage of IP addresses. This is not the only reason to use NAT; there are a host of other reasons also to use NAT. NAT can be understood with the help of an opportune example, a receptionist is the one who is responsible for forwarding calls or dropping them, you can request the receptionist and tell her to forward a specific call if you are expecting it, the receptionist checks the call and confirms the extension when an important client calls and the receptionist knows that this is an important call and it should be forwarded. NAT does exactly the same; it can allow or disallow several packets depending on the set of rules laid out. Static NAT, Dynamic NAT, Overloading and Overlapping are some of the types of NAT. These work in different ways and perform a plethora of operations. NAT can also be used as a firewall; it can easily keep external connections to the network at bay. Port number translation is also carried out by NAT. 65k connections can use a single IP address. Below is an illustration which will shed more light upon how NAT works. (NAT, 2011) Conclusion Lastly, there are a lot of problems that firewalls usually face, the desirable services are often blocked by firewalls. For instance, EA Sports FIFA game may be blocked by a firewall from launching, this can be very hard to detect and the user may think that he has graphic card problems or his Direct X files are outdated. It can cause a lot of chaos and discomfort. Firewalls offer a huge potential for backdoors, this has been exploited to the very maximum by several hackers. Insider attacks can be very difficult to prevent and firewalls have done very little to prevent insider attacks. Newer clients have not been designed to work particularly well with firewalls; this can result in a serious and a very damaging attack on a system which may not be detected by a firewall. Firewalls many a time forward multiple IP transmissions without even checking them properly; these transmissions can easily contain malicious data which might easily harm a user. Bottleneck is another problem, all the data must pass through a firewall and this causes a bottleneck. “A firewall system concentrates security in one spot as opposed to distributing it among systems. A compromise of the firewall could be disastrous to other less-protected systems on the subnet. This weakness can be countered; however, with the argument that lapses and weaknesses in security are more likely to be found as the number of systems in a subnet increase, thereby multiplying the ways in which subnets can be exploited.” (Other Issues) In spite of these limitations and disadvantages it is recommended to use a firewall to block any packets which may contain malicious data. References NAT (2011). Firewalls. Retrieved from http://www.cse.chalmers.se/edu/year/2010/course/EDA491/slides/8.%20Firewalls.pdf Other Issues (2013). Little Protection From. Retrieved from http://www.vtcif.telstra.com.au/pub/docs/security/800-10/node43.html#SECTION00534000000000000000 What is a firewall? (2013). PC Help. Retrieved from http://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security on the Web Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1478254-security-on-the-web
(Security on the Web Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1478254-security-on-the-web.
“Security on the Web Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1478254-security-on-the-web.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Is a Firewall

Benefits and Limitations of Firewalls and DMZ

Because a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internet (Laudon & Laudon, 1999; Benzel, et al.... a firewall based personal security system comprises hardware and/or software that stop an illegal attempts to use data, information, and storage media on a network (Shelly, Cashman, & Vermaat, 2005, p.... Obviously, a firewall itself must be protected and attack proof, if not its capacity to protect links can be diminished....
4 Pages (1000 words) Assignment

Power point presentation about Firewall Technologies

Packet filtering is a firewall technology which acts by "inspecting the packets which represent the basic unit of data transfers between computers on the internet" (Firewall 2008).... a firewall is defined as a "computer, router, or other communication device that filters access to the protected network" (Abie 2000).... Thus, it gives the implication about the main tasks of a firewall.... Accordingly, a firewall inspects traffic network passing through it and is responsible for permitting or denying access....
5 Pages (1250 words) Essay

Actual and Budgeted Costs

This acted as a firewall between the banking and the insurance sector.... n financial terms, firewall refers to the regulatory legal barriers placed by the Glass – Steagall Act 1933 which attempted to prevent the transfer of inside information and performance of financial transactions between commercial and investment banks (Darwish & Evanoff, 2007).... he regulatory firewall between the commercial and investment banking activities indicated that commercial banks should curb their investment activities and that the income from investments should not be over 10%....
3 Pages (750 words) Speech or Presentation

A Firewall Software

6 8 a firewall is a device (it could be software or hardware system) that disallows any illegitimate access towards or from a network.... This means that stateful inspection firewall monitors IP addresses… These firewalls take decisions more intelligently than the simple packet filtering firewalls.... Packet filtering firewall is one of the basic firewall that works on transport and network layer of TCP/IP layering model....
3 Pages (750 words) Essay

Network Security

This paper ''Network Security'' tells that The primary purpose of implementing a computer network is to allow several staff members to enter and update data simultaneously.... This paper presents an analysis of network security for the Athlete's Shack, which runs its business through a chain of sporting goods stores....
5 Pages (1250 words) Essay

Inbuilt Linux and Windows Firewall

IP Tables is a firewall controlled by a command line and uses the policy chains from the user to block or allow traffic.... This paper ''Inbuilt Linux and Windows firewall '' tells that Windows and Linux are two of the most commonly used operating systems in the world.... To check what the IP tables policy chains are configured to do with the unmatched traffic, run IP tables –L command....
5 Pages (1250 words) Essay

Multitunneling Grid Transactions

Apart from this SSH can be used as a tool to connect machines on opposite sites of a firewall(s).... Apart from this SSH can be used as a tool to connect machines on opposite sites of a firewall(s).... The following are the situations that this can be important Where one needs to talk directly to a specific TCP port to a machine that is separated by a firewall/gateway if it is possible to SSH into the gateway.... This alerts SSH that there is interest OPEN UP A SHELL on a firewall, but it is being used just as a relay....
6 Pages (1500 words) Lab Report

Personal Firewalls and Online Armor Personal Firewall Advantages and Disadvantages

The paper "Personal Firewalls and Online Armor Personal firewall Advantages and Disadvantages" is focused on a hardware, software, or a combination of both that is used to monitor and filter traffic going into or leaving a protected or private network, and prevent unauthorized entry into network.... nbsp;… The firewall performs a two-pronged security function of: Filtering of traffic packets based on “accept or deny” policy that is defined by the information security policy Service provision to users within the network through application proxy gateways, while protecting them from malicious users from outside the network....
9 Pages (2250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us