Network Security Firewalls It Infrastructure Cmgt 554

920 words - 4 pages

Network Security - Firewalls

University of Phoenix

IT Infrastructure - CMGT 554

Firewalls are a portion of a network that provide protection for the system from the outside world, the Internet, or Cloud as well as provide a Network administrator the ability to monitor the packets, or requests trying to enter and leave the system or network that they are charged with. Not all firewalls are 100% foolproof; however operating a system without one is like leaving home for a long time and leaving the front door wide open inviting all to enter and take what they want or cause whatever mischief that is desire. A Firewall is akin to a lock on a door preventing unwanted visitors from entering. Its "key function is to legalize the stream of traffic among computers networks of different trust levels" (TopBits, 2010).

Firewalls can be hardware or software. Hardware firewalls usually fit between the company network and the modem connecting the network to the Internet. The external hardware devices provide high-level of defense from intrusion because they are separate devices and they provide their own operating environment that provides an extra line of defense (TopBits, 2010).

Basically four levels of firewalls exist, although not all firewalls fall into any one of any of these firewalls these categories (Boyer, 1997).

 Packet-filtering firewall

 Circuit-level gateway

 Application-level gateway

 Stateful inspection firewall

Packet-filtering Firewall

A packet-filter can be a hardware or software mechanism that is configured to select packets from a traffic stream based on some criteria. This firewall accepts or rejects packets based on the information contained in the packets TCP and IP headers (WebHostGear, 2003). A lot business level IP routers, from Novell or Sysco Systems, are equipped packet-filter firewall capability.

This level of Firewall operates at the third or the "network layer" of the OSI model. The higher on the OSI model the firewall operates the more secure it tends to be; however, there is also a trade off in the speed and transparency of the firewall to the users. This level of firewall is relatively inexpensive and provides a relatively low-level of protection against hackers as this checks only the packet headers and an improper labeled packet can be passed through.

Circuit-level Gateway

A Circuit-level gateway operates at the session-layer of the OSI. The circuit level gateway monitors the TCP handshake packets coming from trusted clients and un-trusted host to determine if a requested session is legitimate. To do this the gateway monitors the handshakes continually. This involves an exchange of packets flagged with SYN (synchronized) or ACK (acknowledge). These...

Find Another Essay On Network Security - Firewalls IT Infrastructure - CMGT 554

Firewalls Why is a firewall valuable?

651 words - 3 pages protect their assets. The firewall examines, filters, and reports on all information passing through the network to ensure its appropriateness.Firewalls are also important since they can provide a single ``check point' where security and audit can be imposed. Unlike in a situation where a computer system is being attacked by someone dialing in with a modem, the firewall can act as an effective ``phone tap'' and tracing tool. Firewalls provide an

Impact of the Internet on Information Technology Security

1185 words - 5 pages the "Information Highway." Even though it helps many businesses, the Internet also creates many problems for their infrastructure. Security is the reason Internet accessible environments changed how businesses function. Businesses are forced to exchange information differently. They must proactively protect and secure internal data and systems. To help this process, businesses in the 1980s started using TCP/IP to develop private Internets.Some of

Internet Security

2387 words - 10 pages -availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, while still growing and evolving at a breakneck pace, is probably impossible. Deep infrastructure changes are needed, and once you have achieved a

Securing WLAN/LAN

1734 words - 7 pages organization has admission to expertise in all aspects of perimeter security, including networking, firewalls, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), Virtual Private Networks (VPNs), UNIX security, and Windows security. In order to direct our attention that somehow our network is secured is that most of us believed that a firewall is secure enough. This is why, IT Specialists probably hear this phrase more often than they

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1339 words - 6 pages System (OS) files that are needed to boot the system are organised by the file system. The file system is therefore the most vital part of the operating system. Allowing users access the file system is as good as exposing it to risk (Simpson, Backman & Corley 2011: 205). Network security controls should be in place. 3.1.3 Running Ubuntu Server 7.1, Apache version 2.2.12, with a MySQL 3.23 back- end Microsoft SQL Server is vulnerable to SQL

Technical Security Policy Proposal for Small Company

1266 words - 5 pages stockholders, but the majority of the company’s stock is owned by its executives and employees. Due to the online nature of the company’s business dealings, TicTek has placed a high priority on the security of network resources, including vendor data, customer data, high availability, and incident response. Mr. Tic, the CEO, has recently requested a security proposal from the IT department to formally put into place a comprehensive security plan to keep

Architecture and design considerations that should go into building a "secure" network.

938 words - 4 pages make them an invaluable security measure. This is why there should be two firewalls at a minimum, one for the inner portion of the network that the internet can’t see, and one for the outer portion of the network which contains the assets that the internet can access also known as the Demilitarized Zone (DMZ). When properly configured, this approach yields a highly secure environment by filtering malicious network traffic before it becomes a

Controls to Diminish Information Security Risks

2320 words - 9 pages company. The security components establish technical controls that are valuable in tackling identifiable threats to the infrastructure (Bass, 2013). Firewalls Firewall access control lists (ACL) labor as a role of the network firewall (Cisco, n.d.). From a practical viewpoint, the firewall establishes a periphery between the public internet and the company’s internal private network (Cisco, n.d.). The firewall safeguards the internal

Corporate Network Management

2150 words - 9 pages can be quite challenging to configure and manage. (Kim & Feamster 2013). These corporate networks consist of multiple routers, switches, firewalls, middleboxes and a particular advantage of network management is the ability to monitor the entire business network. As all the devices are interconnected with many event occurring simultaneously, problems with once device can eventually lead and spread throughout the network, thus it is crucial to

Ecommerce

848 words - 3 pages Firewall Firewall A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent

Phyo Lin Tun

848 words - 3 pages Firewall Firewall A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent

Similar Essays

An Analysis Of Strategic Role Of Information Systems, Specific Social, Ethical And Legal Issues, It Infrastructure And Emerging Technologies, And Information Systems Security Within Fed Ex Corporation

5469 words - 22 pages Date: 4 April, 2010To: Mr. WillsonFrom: Wang Qin and Xin Jun FangSubject: Strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx CorporationEnclosed you will find my analysis with regard to four sections of this report, namely strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and

Information Security Essay

2915 words - 12 pages organizations. This research paper discusses software and hardware firewalls with reference to accounting systems. Definition of firewall A firewall is a software program or specialized hardware devices, designed to check information entering or leaving the network; and either blocking it or allowing it to pass through a node - based on existing security settings (Zwicky, Cooper, & Chapman, 2009). It can also be defined as a rule based program or

Firewalls Essay

896 words - 4 pages works you should test your firewall for optimal security and protection. Firewalls are not all created equally so it is important that your read all documentation that came with the device and go over the manual to get a full understanding of what exactly you have gotten yourself into. Your hardware firewall should always sit on the outermost portion of your logical network. This is known as the perimeter of the network as nothing can get into or

Firewalls: Preventing Unauthorized Access Into A Network

1013 words - 4 pages traffic monitoring hardware / software mechanism and does not analyze actual code or software that is passed. Firewalls generally work off of positive or negative filtering of packets to allow network traffic to pass into the network or be blocked from it. It is important to note that firewalls do contain numerous security features and characteristics, cannot prevent all network related security issues from occurring. For example, upset employees