StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Firewall Software - Essay Example

Cite this document
Summary
From the paper "A Firewall Software" it is clear that stateful inspection firewalls (also known as dynamic packet filtering) have the feature to check the connection "state information" along with simple packet filtering for additional strict security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
A Firewall Software
Read Text Preview

Extract of sample "A Firewall Software"

A firewall is a device (it could be a software or hardware system) that disallows any illegitimate access towards or from a network. (Davis et al., 2011, p. xx-xx) Firewalls can be employed in either software or hardware or by combining both of them. Today firewalls are mostly configured to stop unauthorized access from the internet to the private local area networks (LANs) connected with the internet. Firewalls are configured to monitor all the data that enters or leaves the Intranet. It examines every packet and drops those that do not fulfill security standards set by network security engineers.
The followings are the advantages and disadvantages of using a firewall.
Advantages
• Firewalls track the suspected packets and drop them before accessing the network.
• Firewalls prevent hostile intrusion from the internet to the private local area networks (LANs).
• Firewalls are configured to permit access to users on specific services over the internet.
• A hardware firewall manages the number of systems simultaneously in the network while a software firewall can do the same for an individual computer.
• Firewalls can hide the DNS information of all internal hosts
• A firewall allows a method to implement the network security policy standards of an organization
• Firewalls are configured to decide the direction of particular service requests and are permitted to flow
• Manages the use of particular services are used (e.g. filtering of e-mail)
Disadvantages
• Use of software firewall degrades the performance of the system.
• Hardware firewalls are expensive.
• Proper configuration and maintenance of a hardware firewall is not an easy task.
• A hardware firewall sometimes generates false security alarms that encourage the users not to configure security at the system level.
• If a firewall fails to secure the network from intrusion either by no proper configuration or hardware failure, could result in a disaster.
• Firewalls cannot stop malware.
• Still cannot do anything to an insider attack.
Types of Firewall
There are four types of firewalls.
1. Packet Filtering Firewalls.
2. Application Level Firewalls.
3. Circuit Level Firewalls.
4. Stateful Inspection Firewalls.
Packet Filtering Firewall:
A packet filtering firewall is one of the basic firewalls that work on the transport and network layer of the TCP/IP layering model. (In Vacca, 2014, p. 152-153)A packet-filtering firewall monitors packets that are coming in or going out of the network. It accepts or rejects packets based on criteria defined during its configuration. Filtering packets is pretty effective and transparent to users. One main disadvantage of packet filtering is that it is hard to configure.
A packet filtering firewall inspects the header of every packet on all or any of the following.
1. IP address of the source. A thick check should be made essential as most of the time IP spoofers change the source IP to show the source of the packet from somewhere else, instead of showing the source.
2. IP address of the destination. The firewall should be configured to check the IP address instead of DNS names to prevent the misuse of DNS servers.
3. Protocol used.
4. a Port number of TCP/UDP.
5. Message type of ICMP.
6. Fragmentation flags.
7. Settings of IP Options.

Based on the above checks firewall decides the future of the packet either to allow it (ACCEPT) or disallow it (DROP).
Application Level Firewalls:
Application level firewall is generally an application-specific firewall. It is configured with a set of application-specific rules that can give control over the network traffic at the user’s level. (Kizza, 2014, p. 134-135) The main functionality of the application layer firewall is to manage internet browsing, filter emails, and attachment, and transferring of files. Traffic coming inside the network or going outside the network can be denied or allowed based on the different sets of rules. These rules can be one of the following.
• Disallowing attachments in the email system.
• Transferring a custom block page
• Blocking of a custom email reply.
• HTTP request redirection
• Sending a custom FTP reply over an FTP control channel
Circuit Level Firewalls:
A circuit-level firewall is also known as a transparent proxy firewall. These firewalls work at the transport layer, which enables them to collect, monitor, or block every packet in a TCP/ UDP connection. Circuit-level firewall monitors the TCP handshaking between the packets to conclude the legitimacy of the session. Network traffic is filtered based on session-specified rules, for instance when a session is started by the trusted host. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewalls Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Firewalls Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1635204-firewalls
(Firewalls Essay Example | Topics and Well Written Essays - 750 Words)
Firewalls Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1635204-firewalls.
“Firewalls Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1635204-firewalls.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Firewall Software

Benefits and Limitations of Firewalls and DMZ

Because a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internet (Laudon & Laudon, 1999; Benzel, et al.... a firewall-based personal security system comprises hardware and/or software that stop illegal attempts to use data, information, and storage media on a network (Shelly, Cashman, & Vermaat, 2005, p.... Obviously, a firewall itself must be protected and attack-proof, if not its capacity to protect links can be diminished....
4 Pages (1000 words) Assignment

Power point presentation about Firewall Technologies

Thus, it gives the implication about the main tasks of a firewall.... Accordingly, a firewall inspects traffic network passing through it and is responsible for permitting or denying access.... In addition, Cheswick and Bellovin specifies certain processes which characterizes a firewall which include: "all traffic from inside to outside, and vice-versa, must past through it; only authorized traffic, as defined by the local security policy, is allowed to pass through it; and the firewall itself is immune to penetration" (Abie 2000)....
5 Pages (1250 words) Essay

How does a hardware firewall work

In point of fact, a firewall can divide a network into several domains.... In addition, Firewalls can be either software or hardware.... The threats or problems to this structure include, personal information theft, virus attacks, and business information hacking, Therefore, firewall is an effective solution to deal with these issues.... This paper will present a detailed analysis, implementation, and working of the hardware firewall technology....
5 Pages (1250 words) Term Paper

Firewall Applications

This is because in a reasonable cost it provides adequate support that should be present in any firewall software.... Personal firewall software Review.... Personal firewall software Review.... Personal firewall software Review.... a firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses' intrusion.... It restricts any message transfer that does not comply with the defined Firewall Applications Submitted to, Submitted By, of the Submitted on, [November 6th, INTRODUCTION a firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses' intrusion....
2 Pages (500 words) Essay

Effectiveness of Internet and Network Security Measures

As discussed in the literature review section, some of the common threats facing organizations operating and communicating by means of computers and networking technology are malicious code, information leakage, zero-day exploits, unauthorized software, unethical employees, and complex network infrastructure.... In contrast, since malicious codes (external from the Internet) can go through any communication channel such as Internet websites, email, portable devices, and others, the most common network security measures employed are networking traffic filtering (firewall), scanning incoming files by an anti-malware program, and user behavior modification....
9 Pages (2250 words) Research Proposal

Personal Firewalls and Online Armor Personal Firewall Advantages and Disadvantages

The paper "Personal Firewalls and Online Armor Personal Firewall Advantages and Disadvantages" is focused on a hardware, software, or a combination of both that is used to monitor and filter traffic going into or leaving a protected or private network, and prevent unauthorized entry into network.... ersonal firewalls are software-based firewalls that are installed on a computer to provide protection for the data therein from unauthorized access or intrusion.... The firewall performs a two-pronged security function of: ...
9 Pages (2250 words) Literature review

Network Design for the Medium-Sized Public Relations Company

This report "Network Design for the Medium-Sized Public Relations Company" presents a description of the network infrastructure layout/topology for a Small to Medium-sized Public Relations Company.... The client had given the specifications that the company has 50 staff, who will occupy three floors....
9 Pages (2250 words) Report

Acer Laptop - Information Security Evaluation

You should disconnect your computer from the internet and set up a firewall to protect it against hackers.... My Acer laptop runs on Windows 7 professional operating software as shown in figure 1.... As an ICT student, I am the work who assist my family with both hardware and software maintenance and ensures the security of the system ... Hellewell has also come up with 'simple steps for computer security' which user need to do to ensure that their computer is safe, they include; Firewall-This is a security gateway is comprised of software and hardware that controls access to the computer network....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us