Chapter 5 - Security Mechanisms
Chapter 5 - Security Mechanisms
What is Firewall?
Firewall is a network security device that observes and filters incoming and outgoing network
traffic, adhering to the security policies defined by an organization. Essentially, it acts as a
protective wall between a private internal network and the public Internet. Firewalls are used
to secure a computer network. Firewalls are network security systems that prevent
unauthorized access to a network. It can be a hardware or software unit that filters the
incoming and outgoing traffic within a private network, according to a set of rules to spot and
prevent cyber attacks. Firewalls are used in enterprise and personal settings. They are a vital
component of network security. Most operating systems have a basic built-in firewall.
However, using a third-party firewall application provides better protection.
Types of Firewall
A firewall can either be software or hardware. Software firewalls are programs installed on
each computer, and they regulate network traffic through applications and port numbers.
Meanwhile, hardware firewalls are the equipment established between the gateway and your
network. Additionally, firewalls delivered by a cloud solution can be called as a cloud
firewall. There are multiple types of firewalls based on their traffic filtering methods,
structure, and functionality. A few of the types of firewalls are:
Proxy Service Firewall: This type of firewall protects the network by filtering
messages at the application layer. For a specific application, a proxy firewall serves as
the gateway from one network to another.
Stateful Inspection: Such a firewall permits or blocks network traffic based on state,
port, and protocol. Here, it decides filtering based on administrator-defined rules and
context.
Next-Generation Firewall: According to Gartner, Inc.’s definition, the next-
generation firewall is a deep-packet inspection firewall that adds application-level
inspection, intrusion prevention, and information from outside the firewall to go
beyond port/protocol inspection and blocking.
Unified Threat Management (UTM) Firewall: A UTM device generally integrates
the capabilities of a stateful inspection firewall, intrusion prevention, and antivirus in
a loosely linked manner. It may include additional services and, in many cases, cloud
management. UTMs are designed to be simple and easy to use.
Threat-Focused NGFW: These firewalls provide advanced threat detection and
mitigation. With network and endpoint event correlation, they may detect evasive or
suspicious behavior.
1
How does a firewall works?
As mentioned previously, firewalls filter the network traffic within a private network. It
analyses which traffic should be allowed or restricted based on a set of rules. Think of
the firewall like a gatekeeper at computer’s entry point which only allows trusted sources, or
IP addresses, to enter a network. A firewall welcomes only those incoming traffic that has
been configured to accept. It distinguishes between good and malicious traffic and either
allows or blocks specific data packets on pre-established security rules. These rules are based
on several aspects indicated by the packet data, like their source, destination, content, and so
on. They block traffic coming from suspicious sources to prevent cyber attacks. For example,
the image depicted below shows how a firewall allows good traffic to pass to the user’s
private network.
2
This way, a firewall carries out quick assessments to detect malware and other suspicious
activities.
Proxy Server
What is a Proxy Server?
A proxy server acts as a gateway between user and the internet. It’s an intermediary server
separating end users from the websites they browse. Proxy servers provide varying levels of
functionality, security, and privacy depending on use case, needs, or company policy. When
network users use a proxy server, internet traffic flows through the proxy server on its way to
the address they requested. The request then comes back through that same proxy server
(there are exceptions to this rule), and then the proxy server forwards the data received from
the website to intended user.
3
A proxy server is basically a computer on the internet with its own IP address that your
computer knows. When you send a web request, your request goes to the proxy server first.
The proxy server then makes your web request on your behalf, collects the response from the
web server, and forwards you the web page data so you can see the page in your browser.
When the proxy server forwards your web requests, it can make changes to the data you send
and still get you the information that you expect to see. For example
A proxy server can change your IP address, so the web server doesn’t know exactly
where you are in the world.
It can encrypt your data, so your data is unreadable in transit.
And lastly, a proxy server can block access to certain web pages, based on IP address.
4
their proxy server with a Virtual Private Network (VPN), so remote users always
access the internet through the company proxy. A VPN is a direct connection to the
company network that companies provide to external or remote users. By using a
VPN, the company can control and verify that their users have access to the resources
(email, internal data) they need, while also providing a secure connection for the user
to protect the company data.
Get access to blocked resources: Proxy servers allow users to circumvent content
restrictions imposed by companies or governments. Is the local sportsball team’s
game blacked out online? Log into a proxy server on the other side of the country and
watch from there. The proxy server makes it look like you are in California, but you
actually live in North Carolina. Several governments around the world closely
monitor and restrict access to the internet, and proxy servers offer their citizens access
to an uncensored internet.
5
Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
An intrusion detection system (IDS) monitors traffic on a network, analyzes that traffic for
signatures matching known attacks, and when something suspicious happens, users will be
alerted. In the meantime, the traffic keeps flowing. An intrusion prevention system (IPS) also
monitors traffic. But when something unusual happens, the traffic stops altogether until you
investigate and decide to open the floodgates again.
6
IDS & IPS Working Together
Many companies avoid the IDS vs. IPS problem by deploying both solutions to protect their
assets and servers.
Benefits of VPN
A VPN connection disguises user data traffic online and protects it from external access.
Unencrypted data can be viewed by anyone who has network access and wants to see it. With
a VPN, hackers and cyber criminals can’t decipher this data.
Secure encryption: To read the data, you need an encryption key . Without one, it
would take millions of years for a computer to decipher the code in the event of
a brute force attack . With the help of a VPN, your online activities are hidden even on
public networks.
Disguising your whereabouts: VPN servers essentially act as your proxies on the
internet. Because the demographic location data comes from a server in another
country, your actual location cannot be determined. In addition, most VPN services do
not store logs of your activities. Some providers, on the other hand, record your
behavior, but do not pass this information on to third parties. This means that any
potential record of your user behavior remains permanently hidden.
Access to regional content: Regional web content is not always accessible from
everywhere. Services and websites often contain content that can only be accessed
from certain parts of the world. Standard connections use local servers in the country
to determine your location. This means that you cannot access content at home while
7
traveling, and you cannot access international content from home. With VPN location
spoofing, you can switch to a server to another country and effectively “change” your
location.
Secure data transfer: If you work remotely, you may need to access important files
on your company’s network. For security reasons, this kind of information requires a
secure connection. To gain access to the network, a VPN connection is often required.
VPN services connect to private servers and use encryption methods to reduce the risk
of data leakage.