preview

Network Security : Complete Guide to Firewall

Better Essays

CONTENTS Introduction 2 – 3 What Is a Firewall? 3 – 4 Types of Attack 4 - 5 Firewall Technologies 5 – 6 Choosing a Firewall 7 – 8 Conclusion 8 – 9 Abstract The world is surging towards a digital revolution where computer networks mediate every aspect of modern life. Not many years ago, most computers were carefully guarded mainframes, held tightly in the hands of skilled professionals. The systems and their guardians combined to provide ironclad protection of the organization’s all important data. Today the world is scary, anyone can get their hands on to the personal computers and even link into networks. Today the threat to the information on the network has grown to the …show more content…

. Generally there are three types of attack that could potentially affect your business: • Information theft: Stealing company confidential information, such as employee records, customer records, or company intellectual property • Information sabotage: Changing information in an attempt to damage an individual or company’s reputation, such as changing employee medical or educational records or uploading derogatory content onto your Web site • Denial of service (DoS): Bringing down your company’s network or servers so that legitimate users cannot access services, or so that normal company operations such as production are impeded Firewall Technologies The ICSA (International Computer Security Association) classifies firewalls into three categories: Packet Filter Firewall Every computer on a network has an address commonly referred to as an IP address. A packet filter firewall checks the address of incoming traffic and turns away anything that doesn’t match the list of trusted addresses. The packet filter firewall uses rules to deny access according to information located in each packet such as: the TCP/IP port number, source/destination IP address, or data type. Restrictions can be as tight or as loose as you want. An ordinary router on a network may be able to screen traffic by address, but hackers have a little trick called source IP spoofing that makes data

Get Access