This website uses cookies to ensure you have the best experience. Learn more

Network Security Firewalls It Infrastructure Cmgt 554

920 words - 4 pages

Network Security - Firewalls

University of Phoenix

IT Infrastructure - CMGT 554

Firewalls are a portion of a network that provide protection for the system from the outside world, the Internet, or Cloud as well as provide a Network administrator the ability to monitor the packets, or requests trying to enter and leave the system or network that they are charged with. Not all firewalls are 100% foolproof; however operating a system without one is like leaving home for a long time and leaving the front door wide open inviting all to enter and take what they want or cause whatever mischief that is desire. A Firewall is akin to a lock on a door preventing unwanted visitors from entering. Its "key function is to legalize the stream of traffic among computers networks of different trust levels" (TopBits, 2010).

Firewalls can be hardware or software. Hardware firewalls usually fit between the company network and the modem connecting the network to the Internet. The external hardware devices provide high-level of defense from intrusion because they are separate devices and they provide their own operating environment that provides an extra line of defense (TopBits, 2010).

Basically four levels of firewalls exist, although not all firewalls fall into any one of any of these firewalls these categories (Boyer, 1997).

 Packet-filtering firewall

 Circuit-level gateway

 Application-level gateway

 Stateful inspection firewall

Packet-filtering Firewall

A packet-filter can be a hardware or software mechanism that is configured to select packets from a traffic stream based on some criteria. This firewall accepts or rejects packets based on the information contained in the packets TCP and IP headers (WebHostGear, 2003). A lot business level IP routers, from Novell or Sysco Systems, are equipped packet-filter firewall capability.

This level of Firewall operates at the third or the "network layer" of the OSI model. The higher on the OSI model the firewall operates the more secure it tends to be; however, there is also a trade off in the speed and transparency of the firewall to the users. This level of firewall is relatively inexpensive and provides a relatively low-level of protection against hackers as this checks only the packet headers and an improper labeled packet can be passed through.

Circuit-level Gateway

A Circuit-level gateway operates at the session-layer of the OSI. The circuit level gateway monitors the TCP handshake packets coming from trusted clients and un-trusted host to determine if a requested session is legitimate. To do this the gateway monitors the handshakes continually. This involves an exchange of packets flagged with SYN (synchronized) or ACK (acknowledge). These...

Find Another Essay On Network Security - Firewalls IT Infrastructure - CMGT 554

Firewalls: Preventing Unauthorized Access Into a Network

1013 words - 4 pages traffic monitoring hardware / software mechanism and does not analyze actual code or software that is passed. Firewalls generally work off of positive or negative filtering of packets to allow network traffic to pass into the network or be blocked from it. It is important to note that firewalls do contain numerous security features and characteristics, cannot prevent all network related security issues from occurring. For example, upset employees

Investigation of Network Security Requirements and their Impact on Performance with the aim of establishing configurations fit for the purpose

1015 words - 5 pages firewalls VLANs. 3. Simulation and Results Analysis 3.1 based on the network designed in 2, simulations will be carried out using OPNET IT Guru academic edition. 3.2 Results of the simulations will be corrected and analyzed 3.3 A discussion of results from each simulation carried out. 4. Project Closure 4.1 Conclusion/Lessons learned To provide a critical evaluation on the selected Network Security Requirements/Configurations 5. Planning To

Firewalls Why is a firewall valuable?

651 words - 3 pages protect their assets. The firewall examines, filters, and reports on all information passing through the network to ensure its appropriateness.Firewalls are also important since they can provide a single ``check point' where security and audit can be imposed. Unlike in a situation where a computer system is being attacked by someone dialing in with a modem, the firewall can act as an effective ``phone tap'' and tracing tool. Firewalls provide an

Impact of the Internet on Information Technology Security

1185 words - 5 pages the "Information Highway." Even though it helps many businesses, the Internet also creates many problems for their infrastructure. Security is the reason Internet accessible environments changed how businesses function. Businesses are forced to exchange information differently. They must proactively protect and secure internal data and systems. To help this process, businesses in the 1980s started using TCP/IP to develop private Internets.Some of

Firewall

1737 words - 7 pages policy and need." (Eugene H. Spafford, 2003, Cyber Terrorism: The New Asymmetric Threat). As we all know, a company is rarely to have only a gate security to check a person who try to enter and without receptionist or other securities to check that person on the way in, if it is reasonable to have layers of security in the company, it is also reasonable to have layers of security on our network. "Some firewalls can also help to prevent others from

Internet Security

2387 words - 10 pages -availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, while still growing and evolving at a breakneck pace, is probably impossible. Deep infrastructure changes are needed, and once you have achieved a

Securing WLAN/LAN

1734 words - 7 pages organization has admission to expertise in all aspects of perimeter security, including networking, firewalls, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), Virtual Private Networks (VPNs), UNIX security, and Windows security. In order to direct our attention that somehow our network is secured is that most of us believed that a firewall is secure enough. This is why, IT Specialists probably hear this phrase more often than they

Network Sercurity Industry

1005 words - 5 pages security methods and protocols and they are authentication and encryption. These security methods are supported by security protocols. Public Key infrastructure is the use of public keys or encryption keys to create a secure environment for the exchange of data between network devices. It is a form of authentication and encryption. A key is generated and used for encryption and a certificate is generated and used to verify authentication

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1339 words - 6 pages System (OS) files that are needed to boot the system are organised by the file system. The file system is therefore the most vital part of the operating system. Allowing users access the file system is as good as exposing it to risk (Simpson, Backman & Corley 2011: 205). Network security controls should be in place. 3.1.3 Running Ubuntu Server 7.1, Apache version 2.2.12, with a MySQL 3.23 back- end Microsoft SQL Server is vulnerable to SQL

Technical Security Policy Proposal for Small Company

1266 words - 5 pages stockholders, but the majority of the company’s stock is owned by its executives and employees. Due to the online nature of the company’s business dealings, TicTek has placed a high priority on the security of network resources, including vendor data, customer data, high availability, and incident response. Mr. Tic, the CEO, has recently requested a security proposal from the IT department to formally put into place a comprehensive security plan to keep

Architecture and design considerations that should go into building a "secure" network

938 words - 4 pages make them an invaluable security measure. This is why there should be two firewalls at a minimum, one for the inner portion of the network that the internet can’t see, and one for the outer portion of the network which contains the assets that the internet can access also known as the Demilitarized Zone (DMZ). When properly configured, this approach yields a highly secure environment by filtering malicious network traffic before it becomes a

Similar Essays

An Analysis Of Strategic Role Of Information Systems, Specific Social, Ethical And Legal Issues, It Infrastructure And Emerging Technologies, And Information Systems Security Within Fed Ex Corporation

5469 words - 22 pages Date: 4 April, 2010To: Mr. WillsonFrom: Wang Qin and Xin Jun FangSubject: Strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx CorporationEnclosed you will find my analysis with regard to four sections of this report, namely strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and

Information Security Essay

2915 words - 12 pages organizations. This research paper discusses software and hardware firewalls with reference to accounting systems. Definition of firewall A firewall is a software program or specialized hardware devices, designed to check information entering or leaving the network; and either blocking it or allowing it to pass through a node - based on existing security settings (Zwicky, Cooper, & Chapman, 2009). It can also be defined as a rule based program or

Building A Secure Network Essay

906 words - 4 pages downloaded for free. Wireshark is a packet analyzer that to captures and displays the data packets. This tool helps users see a data packet and check it for tampering. It is used in conjunction with SNORT. Building and Designing a network can long and tedious task. The time and development of security policies is a process that can equal the creation time of the network topology. The security implementations to secure the infrastructure must be

Firewalls Essay

896 words - 4 pages works you should test your firewall for optimal security and protection. Firewalls are not all created equally so it is important that your read all documentation that came with the device and go over the manual to get a full understanding of what exactly you have gotten yourself into. Your hardware firewall should always sit on the outermost portion of your logical network. This is known as the perimeter of the network as nothing can get into or