This website uses cookies to ensure you have the best experience. Learn more

Firewalls: Preventing Unauthorized Access Into A Network

1013 words - 4 pages

Firewalls are used in businesses to help prevent attacks, mitigate security issues, and provide a sense of known security for the organization. Firewall characteristics are generally the same from firewall brand or vendor to another in that they provide authorized access only into a network. This review will look into the common security features that are present within firewalls and how they are used in daily functions to help prevent issues that threaten organizations.
Firewalls work by preventing unauthorized access into a network by monitoring and enabling / disabling traffic via security policies and procedures. Grimes states, “Firewalls work by inspecting and filtering packet traffic between two networks. Firewalls are categorized according to the layer of the Open System Interconnection (OSI) model that they inspect. Most firewalls are packet filters, meaning they work at the network layer of the OSI model and make logic decisions based on the packet's IP addresses (source and destination), IP port numbers, and whether the packet is in UDP or TCP format. Circuit-layer firewalls work at the transport layer of the OSI model and inspect host-session information. Circuit-layer firewalls can block packets based on the host name and other IP session information such as flags and sequencing numbers” (Grimes, 2003). Some recent firewalls even include autoban features that help monitor network activity and autoban a point of entry (often IP address or port) that alleviates known attacks or patterns of attacks such as DDOS. Many firewalls now include monitoring and reporting activities to alert Information technology staff that an issue is or has occurred and what steps were taken automatically by the firewall to prevent the issue. In the attempt of autoban, it is a great feature but should be managed by the IT staff to ensure local necessary traffic is not blocked automatically that should not be. In other words, often firewalls with auto-ban and auto-block features can return false positives where each should be reviewed and analyzed by the IT staff.
Some attacks do bypass firewall level security features such as software based worms, Trojans, or other malicious software, as the firewall acts as a high level traffic monitoring hardware / software mechanism and does not analyze actual code or software that is passed. Firewalls generally work off of positive or negative filtering of packets to allow network traffic to pass into the network or be blocked from it. It is important to note that firewalls do contain numerous security features and characteristics, cannot prevent all network related security issues from occurring. For example, upset employees that already have authenticated access to the system may sabotage or harm the network of which the firewall can not manage. Features or portions of the network that bypass the firewall must be analyzed and planned for to ensure maximum network uptime and performance.
Firewalls can be used as a...

Find Another Essay On Firewalls: Preventing Unauthorized Access Into a Network

Firewalls Why is a firewall valuable?

651 words - 3 pages corporation has to protect its assets (data, software, etc.). Furthermore, a firewall helps to control information flow between sites and therefore assists in preventing congestions on the network. Using a firewall is an important part of a company's risk management strategy. There should be a maximum thread protection with minimum risk, high performance, and ease of administration.What does it Do A firewall may consist of several pieces of

All about Network Security Essay

873 words - 4 pages attack can potentially infer large amounts of damage and losses if not taken into consideration. Here is some explanation of each above-mentioned attack. Complete Unauthorized Access As the name suggests, attackers can gain complete access to a system and can easily control and modify any information to their will. This can be very lethal, as the attack would have all the privileges for that system. Data Theft Here the attacker might not have

Securing WLAN/LAN

1734 words - 7 pages organization has admission to expertise in all aspects of perimeter security, including networking, firewalls, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), Virtual Private Networks (VPNs), UNIX security, and Windows security. In order to direct our attention that somehow our network is secured is that most of us believed that a firewall is secure enough. This is why, IT Specialists probably hear this phrase more often than they

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1339 words - 6 pages security risk to equipments. The controls over employees, visitors and outsiders should be put in place. Such controls include barriers used to limit access to physical premises and preventing unauthorized entry and removal. 3.1.2 Users are allowed to install their own software as needed The company is exposed to Windows file system vulnerabilities as users are allowed to install their own software. The information that users create and Operating

Proposal: Network Security

1382 words - 6 pages three unsuccessful authentication attempts. The user must then contact a network administrator to have the account unlocked and password reset if necessary. To mitigate unauthorized access to unattended computers screensaver policy should be set to lock to computer after 15 minutes of inactivity and require the user to enter a password to resume. All recommended settings should be enforced using Microsoft Active Directory Group Policy Settings


896 words - 4 pages some sort of malware it has the possibility to be spread across the entire network infecting every device it has access to. The hardware firewall can do nothing about this except possibly contain it to the network. Hardware firewalls only inspect data coming into and out of the network so anything that is already inside the network basically has free roam. A hardware firewall can do nothing once malware is introduced into the system either by

Impact of the Internet on Information Technology Security

1185 words - 5 pages proxy servers, which makes network requests for the users. Additionally, firewalls are frequently installed on a designated computer separate from the network. This prevents incoming requests from getting directly at the private network resources.A firewall can control network activity by using up to three different methods:•Packet Filtering - controlling access to a network by analyzing the incoming and outgoing packets and letting them pass

Network Security - Firewalls IT Infrastructure - CMGT 554

920 words - 4 pages Network Security - Firewalls University of Phoenix IT Infrastructure - CMGT 554 Firewalls are a portion of a network that provide protection for the system from the outside world, the Internet, or Cloud as well as provide a Network administrator the ability to monitor the packets, or requests trying to enter and leave the system or network that they are charged with. Not all firewalls are 100% foolproof

An analysis of Security Management in an organization

9269 words - 37 pages firewalls and neglecting the numerous other back-doors into their network. For a firewall to work, it must be a part of a consistent overall organizational security architecture. Firewall policies must be realistic and reflect the level of security in the entire network. For example, a site with top secret or classified data doesn't need a firewall at all: they shouldn't be hooking up to the Internet in the first place, or the systems with the

Technical Security Policy Proposal for Small Company

1266 words - 5 pages ensure that information is not obtained by unauthorized persons when traversing an untrusted network, such as the Internet or a public Internet access point. To ensure that servers and devices, such as routers and switches, are configured consistently at all times, formal documentation will be drafted and available at all times to instruct on the proper configuration of such devices. In the event that a device fails and has to be replaced, or

Networking Basics and requirements

2192 words - 9 pages connect up to eight computers and so on. Most hubs are stackable. A stackable hub has a special port that can connect it to another hub to increase the capacity 2- Firewalls: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or

Similar Essays

Architecture And Design Considerations That Should Go Into Building A "Secure" Network

938 words - 4 pages by reducing the amount of hosts in a collision domain. Although VLANs are great, there are techniques that can be used to transfer between VLANs. To secure traffic at the network layer access lists and firewalls are the best options. Access lists on routers and firewalls are effective at managing network traffic to and from different areas or even specific assets within a network. The ability to manage traffic by IP address, port, and protocol

Network Security Essay

667 words - 3 pages Unauthorized Network and system access – An attacker needs access before being able to perform any attacks. An attacker can be a disgruntled employee, an employee that has become a victim if social engineering or a competitor. Access can be achieved by gaining control of resources or by connecting equipment to the network. The risks posed by unauthorized network access are: unauthorized join or network expansion, VLAN join, VLAN tagging or

Information Security Essay

2915 words - 12 pages device intended to allow network traffic to pass through while blocking unwanted traffic. Firewalls are usually placed between an entity’s network and the insecure public internet. They act as a first line of defense in opposition to unwanted traffic. In this respect, a firewall can help entities to prevent malicious software or hackers from gaining access to their systems or networks. An example of a software firewall is Windows Firewall, which

What Is Network Security Essay

631 words - 3 pages . Unprotected network shares are network shares with very little to no security and sometimes are made so that the members of this network can access them from their home. This can give a hacker a very easy way to get in. Social engineering involves manipulating members into giving security information. This is sometimes seen when a hacker deceives a member of a network into thinking that he or she is an authority and requires their account information