top-rated free essay

network security

By jalalsoofi Jul 04, 2014 601 Words
Firewall:-
A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet. If you use a computer at home the most efficient and important step to help your computer to protect by turning on your firewall. If you have a more than one computer connects in home. It is important to protect every computer. You should have a hardware firewall (such as router) to protect your network, but you should also use software firewall on each computer to prevent the spread of virus your network. If your computer is a part of business, you should follow the policy established by network administrator. How it works:-

When your firewall protection is turned on, everything that goes in and out of the network is monitored. The firewall monitors allows ‘good data’ in and block ‘bad data’ from entering your network. Firewall uses one or combination of the following method to control the traffic in and of the network:- 1) Packet filtering:-

The most basic form of firewall software uses pre-determined rules to create different filters. If an incoming packet of data (small chunk of data) is flagged by the filters, it is not allowed through. Packets that make it through the filters are sent to requesting system and all others are discarded. 2) Proxy services:-

A proxy service is an application that acts as an intermediary between systems. Information from the internet is received by the firewall and sent to the requesting system and vice versa.
Proxy server operates at the application layer of firewall, where both ends of the connection are forced to conduct session through the proxy. They operate by creating and running a process on the firewall that mirrors a service as if it were running on the host end, and thus centralize all the information transfer to the firewall for scanning. 3) Stateful inspection:-

The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being transferred. Types:-

There are two types of firewall that are as follows:-
Hardware firewall.
Software firewall.
1) Hardware firewall:-
Hardware firewall built into the device such as routers and can protect every single machine on a network and require little configuration for efficient work. They mostly use packet filtering technique to examine the header of the packet, determining source and destination, then comparing the data to a set of predefine rules, they decide whether to ignore the packet or forward to the next step or to its final destination. 2) Software firewall:-

Software firewalls are the most popular protection method for home users. They usually come as standalone applications or as a part of complete antivirus protection software. That is why it is mostly used in personal network. Antivirus such as bull guard provides besides providing protection for inbound and outbound traffic. A software firewall also protects against worms and Trojan horses.

The software firewall must be regularly protected to keep up the latest technology updates and provides effective protection. NOTE:-
Each type has advantages and disadvantages, ranging from ease of implementation to high initial cost. Companies should use the firewall as part of overall information security program that includes data integrity, application integrity and data confidentiality and authentication.

Cite This Document

Related Documents

  • Worldwide Network Security

    ...MARKET ANALYSIS Worldwide Network Security 2012–2016 Forecast and 2011 Vendor Shares John Grady IDC OPINION The worldwide network security market grew by 6.1% in 2011. The total market, which includes firewall, unified threat management (UTM), intrusion detection and prevention (IDP), and virtual private network (VPN) solutions, reached $...

    Read More
  • NTC411 Week 5 Security Solutions

    ... Week 5 Security Solutions T. Lee NTC/411 November 2013 Week 5 Security Solutions In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not...

    Read More
  • Data Security

    ...__________. a. over a single IP network 4. Each of the following is a convergence security vulnerability except __________. a. convergence resource attacks (CRA) 5. Which of the following is not true regarding a demilitarized zone (DMZ)? a. It contains servers that are only used by internal network users. 6. Network address tr...

    Read More
  • Security Assessment - Aircraft Solutions

    ...Course Project: Security Assessment and Recommendations – Phase I & II Aircraft Solutions Table of Contents Executive Summary……………………………………………………..1 Company Overview……………………………………………………..1 Hardware Vulnerability………………………………...

    Read More
  • Computer Network Security and Firewall

    ... Principals of Information Security 4th Edition Questions Chapter 6 Questions 1. What is the typical relationship among the untrusted network, the firewall, and the trusted network? The relationship is that data is only limited to what firewalls allow via specific places called “ports”. There is the untrusted network on the outside, ...

    Read More
  • Network Based Intrusion Prevention System (Nips)

    ...Network Based Intrusion Prevention System (NIPS) Definition: An intrusion prevention system sit in-line on the network and monitors the traffic, and when a suspicious event occurs it takes action based on certain prescribed rules. An IPS is an active and real time device, unlike an Intrusion detection system which is not inline and they ar...

    Read More
  • Firewall in Computer Networks

    ...CHAPTER-1 INTRODUCTION 1.1 Firewall in computer networks Firewall: A set of related programs, located at a network gateway server, which protects the resources of a private network from users from other networks using security policies. The Internet has made large amounts of information available to the average computer user at home, ...

    Read More
  • Network Security

    ...Firewall Quiz 1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment. 2. A(n) Router____ is a network device that can forward packets across computer networks. 3. A(n) Proxy server____ is a comp...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.