Firewalls

In: Computers and Technology

Submitted By nashah
Words 1098
Pages 5
DAYSTAR UNIVERSITY

An assignment

IN PARTIAL FULFILLMENT TO THE COURSE ACS 431

Presented by:

Gladys Mumbua (10-1809)

Submitted to

MR FREDRICK OGOR

FIREWALLS
A firewall is a device that serves as a barrier between networks providing access control, traffic filtering and other security features. Firewalls are commonly deployed between trusted and untrusted networks, for example between the Internet (untrusted) and an organization’s trusted private various network. They [firewalls] can also be used internally to segment an organization’s network infrastructure, for example; deploying a firewall between the traffic was received to determining whether the corporate financial information and the rest of the company network. A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
Hardware based firewalls:
Hardware firewalls are exactly what the name implies; hardware device that is placed somewhere in the traffic flow of an organization’s network. Once in place, the device receives and analyzes packets traveling into and out of the network. The device then checks a list of previously specified access rules to see if it should allow the packet to continue to its destination, or if the packet should be discarded.
A hardware based firewall is a standalone product such as a broadband router. It allows connected computers to transfer data between each other and access the internet. The hardware…...

Similar Documents

Firewalls

...Firewall Taxonomy Firewalls come in various sizes and flavors. The most typical idea of a firewall is a dedicated system or appliance that sits in the network and segments an "internal" network from the "external" Internet. Most home or SOHO networks use an appliance-based device for broadband connectivity that includes a built-in firewall. Following is the description of three most important type of firewalls Personal Firewalls Personal firewalls are designed to protect a single host. They can be viewed as a hardened shell around the host system, whether it is a server, desktop, or laptop. Typically, personal firewalls assume that outbound traffic from the system is to be permitted and inbound traffic requires inspection. By default, personal firewalls include various profiles that accommodate the typical traffic a system might see. For example, Zone Alarm has low, medium, and high settings that allow almost all traffic, selected traffic, or nearly no traffic, respectively, through to the protected system. In a similar vein, IP Tables. which you can set up as a personal firewall as well as in a network firewall role during the setup of the Linux system, enables the installer to choose the level of protection for the system and the customization for ports that do not fall into a specific profile. One important consideration with personal firewalls is centralized management. Some vendors have identified that a significant barrier to deployment of personal......

Words: 1326 - Pages: 6

Implementing Firewall Configurations

...Implementing Firewall Configurations Robert Collazo Rasmussen College Implementing Firewall Configurations First he would like me to use a host firewall in which case I would then use the Windows Firewall. Windows Firewall with Advanced Security includes a host-based firewall component that is a protective boundary for the local computer, which monitors and restricts information that travels between your computer and its attached networks or the Internet. It provides an important line of defense against someone who might try to access your computer without your permission. Then he would like me to be able to configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows......

Words: 344 - Pages: 2

Network Security, Firewalls, and Vpns

...encapsulation. 11. What is a difference between a DMZ and an extranet? VPN required for access. 12. What is the primary security concern with wireless connections? Signal propagation 13. What are two elements of network design that have the greatest risk of causing a DoS? Single point of failure Bottlenecks 14. For what type of threat are there no current defenses? Zero day 15. Which of the following is true regarding a layer 2 address and layer 3 address? * Layer 2 addresses can be filtered with MAC address filtering * Network layer address is at layer 3 and is routable 16. Which of the following are not benefits of IPv6? RFC 1918 Address 17. What is the most common default security stance employed on firewalls? Denying by default 18. What is egress filtering? Examining traffic as it leaves a network 19. Which of the following is not a feature of a proxy server? MAC Address Filtering 20. Which of the following is allowed under NAC if a host is lacking a security patch? Access to remediation servers...

Words: 347 - Pages: 2

Firewalls

...Checkpoint: Firewalls IT/242 Your Name A firewall is one of the main software features that are in a computer system or a network. The job of a firewall is to prevent unauthorized access from the outside while authorizing access that is permitted. Firewalls are mainly used to keep outside intruders from accessing the private networks. There are several types of firewalls that are available for security. Firewall can be used for a home network, work network, and large business networks. The first level for a firewall is the packet filters. The packet filters can offer access and refuse access to any machines that are located within the network system and outside the network. It is also able to manage the direction of access the machine has. A firewall can control and allow incoming traffic as well as outgoing traffic. The second level is the application level gateway. The application level gateways are kept between the user that is on the Internet network and the service on the Internet. The next level of firewall is the circuit level gateway. The circuit level gateway functions on the transport level of the OSI model. The UDP and TCP are checked by the Circuit level gateways before attempting to make the connection. A proxy server is the last level of a firewall. This is used to intercept all of the messages that enter and leave the network system. The proxy server is able to conceal the true network addresses. When it comes down to choosing which firewall will best......

Words: 320 - Pages: 2

Firewalls

...Firewalls are essential security elements in any network. However, as with all aspects of network security, deploying firewalls is a complicated task. Many factors need to be considered, chief among them is cost and function. A dilemma faces all firewall administrators: what is the proper balance between firewall security and network usability. In other works, how can one make the network secure as possible with a firewall while maintaining ease of use and maintaining appropriate speed of the connections for the users? There is no one or easy answer to this question. Each network and organization is unique. I believe that fact is the key to a good answer. Since each organization has unique objectives and goals the firewall must protect those security elements that achieve those objectives and goals. To some extent, firewalls must be customized to meet the needs of the organization. I have read about the trade-offs of an out-of-the-box firewall versus a firewall that is built from scratch to meet the requirements of a particular network’s security. A do-it-yourself firewall has the advantage of being highly customized to the needs of the organization and an out-of-the-box firewall generally is more expensive. Does that make a do-it-yourself firewall the better choice? I think not. It seems to me that a pre-built firewall has one overriding advantage when compared to a do-it-yourself unit: documentation and support. What if the builder of that do-it-yourself......

Words: 534 - Pages: 3

Firewalls

...Firewalls Samuel Vallez May 2, 2014 IT/242 Joseph Guin A firewall is a tool that is really used to monitor the flow of traffic on a network to ensure that there is nothing that is harmful being transmitted. There are three kinds of firewalls that can be used which are network, application, and circuit. The network firewall basically works by inspecting packet headers and filtering traffic based on the IP address. It is a pretty fast way of doing things and is still in use today. The downfall is that it is unable to understand languages like HTML or XML and this leaves you open to lots of threats. Application firewalls dig a lot deeper into the application data that is going through the filter. It is a process that takes longer, but boasts features like logging of user activity and filtering sites based on content and not just by IP address. Circuit level is more based on making sure that a session is legitimate by monitoring TCP handshaking between packets. This does not filter individual packets and is bound to certain session rules. It is very helpful in protecting the network from outside intrusion. All three firewalls are useful in one way or another. I personally think that the application based firewall is the best out of all three. Most threats these days can be caught with this type of firewalling. While it is not full proof and takes some more time, I think that it is the most helpful to use....

Words: 255 - Pages: 2

Firewall

...Barracuda NG Firewall Scalable Security for the Enterprise Enterprise networks grow larger and more complex every day - and more critical to key business operations. The Barracuda NG Firewall is an essential tool to optimize the performance, security, and availability of today's dispersed enterprise WANs. Security Storage Application Delivery The Barracuda Advantage Effective WAN Management • Application-based traffic prioritization across the WAN • Intelligent uplink balancing • Intelligent traffic re-prioritization on uplink loss Enterprise Readiness • Industry-leading centralized management • WAN optimization • Global WAN monitoring with Barracuda NG Earth Scalable Security • Cloud Enablement and secure WAN Virtualization • Drag-and-drop VPN graphical tunnel interface Product Spotlight • Powerful next-generation network firewall • Intelligent traffic regulation and profiling • Centralized management of all functionality • Deep application control • Comprehensive, built-in IDS/IPS • Tightly integrated QoS and link balancing • Template-based and role-based configuration • Built-in web security (model F100 and higher) Integrated Next-Generation Security The Barracuda NG Firewall is designed and built from the ground up to provide comprehensive, next-generation firewall capabilities. Cloud-hosted content filtering and reporting offload compute-intensive tasks to the cloud for greater resource efficiency and throughput. Based on application visibility,......

Words: 1351 - Pages: 6

Firewall N Vpn

...Stephy Stitt Firewall/VPN Project 1 August 24, 2014 There are a number of risks on our network. Those risks are data confidentiality, data access and network issues. Our network has a router/firewall configuration. All files are kept on the network. The network can be accessed from home. The computers in the lab have direct access to the internet. All of these can invite potential threats at any time. The network allows potential threats through a router/firewalled device. I am assuming that the firewall has been configured by a default means. This will give hackers the ability to exploit any open ports left open. There will also be the security hole of the router itself if the firewall has not been configured correctly. I am also assuming that the sysadmin passwords have not been changed from their default status. Second, all data is kept on the network. I am assuming that there is no centralized server or storage for this data. If the data were kept all over the place on workstations or some external drive then this will invite hackers to gain access to all of the data. There was also no mention of this data being secured by passwords or permissions. Third, the users can access the network from home. This is a huge risk. There is no mention of VPN or other means of secure network entry. There is also no mention that the user’s personal workstations are secure enough to be on the company network. It seems that they are able to remote to any workstation on......

Words: 980 - Pages: 4

Firewall Software

...Software firewall: Firewall software has programs which are designed to monitor the data and also control the flow of traffic between the PC’s and the network. They are used to prevent unapproved access to PC’s or networks. The programs in firewall can allow, control access, encrypt, or substitute computer traffic based on settings. Advantages and disadvantages of software firewall: The advantage of firewall software is that it runs directly on the computer where it can also know about the network traffic along with what port it is using and where it is going. Firewall keeps in track about the programs that are trying to access internet and it identifies whether it is authorized or malicious. Depending on whether the access is authorized or not, it will allow sending and receiving data. If at all the firewall is not sure about the nature of the program then the user is urged to provide confirmation before the traffic is allowed to access (Pacchiano, 2011). The disadvantage of software firewall is that it only protects the machine where it is installed in. To protect multiple machine via firewalls you need to purchase multiple licensed copies and install and configure them individually in each system, which is expensive and difficult to manage (Pacchiano, 2011). Reference: Pacchiano, R. (June 09, 2011). Firewall Debate: Hardware vs. Software. Retrieved from......

Words: 491 - Pages: 2

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in......

Words: 3381 - Pages: 14

Assignment 2 Types of Firewalls

...Types of Firewalls A firewall is a network security system that filters the incoming and outgoing traffic on a computer network. Filtering allows what is wanted on a network and denies what is not wanted. Anywhere a computer is used to interact with and exchange resources with other computers, will require using a firewall. Four types of firewalls to consider are personal, commercial, appliance, and software firewalls. What each firewall is designed to do, along with any special requirements for using them, will be discussed as well. Personal firewalls are designed to protect individual computer systems or small networks. Personal firewalls allow a security policy to be defined for individual computers. Personal firewalls are useful to protect computers that can be moved across different networks. With a personal firewall, a laptop computer can be used at public Wi-Fi hotspots where strict security is required. The same laptop can also be used in the workplace where minimal protection is needed due to a conventional firewall usually already in place on a trusted intranet. Most personal firewalls usually do not require special training or certifications before being used. They usually have a friendly user interface, such as a graphical user interface, or GUI, which allows for easier use. Commercial firewalls are designed to provide protection for medium sized to large sized business networks. Most commercial firewalls are more complex than personal......

Words: 643 - Pages: 3

Firewalls Checkpoint

...Firewalls According to Regan (2004) firewall is a combination of hardware and software that serves as defense against external threats to a network system, a firewall’s task in a networked environment is to block communications not permitted by the security policy. Another function is to keep computer networks secure and safe by working as a barrier keeping destructive forces away from network systems. A firewall also controls traffic between different zones, typical the zones include an internal network, and the Internet. The main three types of firewalls are; dynamic packet filter, circuit gateway, and application gateway firewall. Dynamic packet filter is a firewall that supervises active connections and it uses the information obtained to determine what network packets are allowed to be processed through the firewall. This is done by recording data such port numbers as well as IP addresses. The way dynamic packet filter protects the company’s network is by configuring its firewall when a company authorizes employees to access external Internet it is safe because it is configured to only allow reply to the user’s information request back in. A Circuit Gateway firewall’s purpose is to configure a firewall to validate connections before data is exchanged. The Circuit Gateway functions at the OSI Model Transport Layer, the way in which traffic is filter mainly depends on specified session rules that are modified and allowed on specific computers. Using a Circuit......

Words: 381 - Pages: 2

Importance of Firewall

...Importance of Firewall The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some cases users have a very lax opinion of what should and should not be allowed...

Words: 529 - Pages: 3

Firewall

...Firewalls Overview Tutorial Firewalls This interactive will cover the aspects related to the utilization of firewalls in an organization. One important thing that needs to be kept in mind regarding firewalls is that they are commonly deployed at the organizational perimeter AND on the individual computers inside the organization. Since the perimeter firewall predated the single computer firewall perimeter firewalls are frequently referred to as firewalls. Firewalls protecting a single computer are called host based firewalls, software firewalls or client firewalls. While there are many ways to categorize perimeter firewalls, perhaps the most effective way is to look at them in terms of functionality. From a functional standpoint firewalls can be divided into Access Control List based, State Based and Application Proxy firewalls. The easiest way to understand the Access Control based firewall is to consider the fact that they can restrict traffic based on the source IP address of the packet. You would not want a packet coming in from the outside that has an IP address that should be INSIDE your organization. This might be from someone using a “SPOOFED” source IP address to attack your internal network resources. If you were receiving numerous packets from a single IP address this might be from someone trying to perform a Denial of Service (DoS) attack on you. Obviously you would want to block traffic from that IP address. Sometimes this functionality is...

Words: 421 - Pages: 2

Importance of Firewall

...Importance of Firewall MedIQ is going in the right direction by adding a firewall in their network. The importance of a firewall is that it blocks malware that would be able to scan your computer to find its vulnerable areas and then attempt to break it while it is at its weakest point. First of all there is only one way to make your computer completely safe from attack and that is either when it is off or unconnected from the Internet. Other than that there are always vulnerabilities. However, you can make it as close to hacker proof as possible while it is connected to the Internet. The way to do this is to have a personal firewall installed along with antivirus and anti spyware protection. Plus you have to make sure that all three of these are updated on the regular. Additional protection is available to a network that used a router with a firewall feature. Firewalls protect your computer from outside attacks by guarding it from unnecessary Internet traffic. They can however be configured to block certain data while letting other data in. The importance of a firewall on your computer can not be underestimated especially for those who are always connected to the Internet. Firewalls are positioned between your computer and your network and are great for protecting multiple computers but also offer a great degree of protection for single computer use. It allows individual users decide how much content they want to filter through and what websites are safe to use. In some...

Words: 1017 - Pages: 5

Closer: Perto Demais (Closer) 2004 | Telefoons | سقي ديكو والري