Firewall Cyber Security
Firewall Cyber Security
FIREWALL
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based
on a defined set of security rules.
here are mainly three types of firewalls, such as software firewalls, hardware
firewalls, or both, depending on their structure. Each type of firewall has
different functionality but the same purpose. However, it is best practice to
have both to achieve maximum possible protection.
Besides, there are many other types of firewalls depending on their features
and the level of security they provide. The following are types of firewall
techniques that can be implemented as software or hardware:
o Packet-filtering Firewalls
o Circuit-level Gateways
o Application-level Gateways (Proxy Firewalls)
o Stateful Multi-layer Inspection (SMLI) Firewalls
o Next-generation Firewalls (NGFW)
o Threat-focused NGFW
o Network Address Translation (NAT) Firewalls
o Cloud Firewalls
o Unified Threat Management (UTM) Firewalls
Packet-filtering Firewalls
A packet filtering firewall is the most basic type of firewall. It acts like a
management program that monitors network traffic and filters incoming
packets based on configured security rules. These firewalls are designed to
block network traffic IP protocols, an IP address, and a port number if a data
packet does not match the established rule-set.
Circuit-level Gateways
In simple words, when a user establishes a connection and requests data, the
SMLI firewall creates a database (state table). The database is used to store
session information such as source IP address, port number, destination IP
address, destination port number, etc. Connection information is stored for
each session in the state table. Using stateful inspection technology, these
firewalls create security rules to allow anticipated traffic.
Threat-focused NGFW
When multiple devices are used to connect to the Internet, NAT firewalls
create a unique IP address and hide individual devices' IP addresses. As a
result, a single IP address is used for all devices. By doing this, NAT firewalls
secure independent network addresses from attackers scanning a network for
accessing IP addresses. This results in enhanced protection against suspicious
activities and attacks.
In general, NAT firewalls works similarly to proxy firewalls. Like proxy
firewalls, NAT firewalls also work as an intermediate device between a group
of computers and external traffic.
Cloud Firewalls
UTM firewalls are a special type of device that includes features of a stateful
inspection firewall with anti-virus and intrusion prevention support. Such
firewalls are designed to provide simplicity and ease of use. These firewalls
can also add many other services, such as cloud management, etc.
If an organization has the resources and can afford a separate firewall for
each hardware piece, this is a good option. Besides, a cloud firewall may be
another consideration.
The number and type of firewalls typically depend on the security measures
that an internal network requires. This means, if an organization maintains
sensitive data, it is better to implement multi-level protection of firewalls. This
will ensure data security from hackers.
Firewall configurations
o For traffic from the internet, only IP packets destined for the
basiton host are allowed in.
o For traffic from the internal network, only IP packets from the
bastion host are allowed out.
· The outside router advertises only the existence of the screened subnet to
the internet; therefore, the internal network is invisible to the internet.
· Similarly, the inside router advertises only the existence of the screened
subnet to the internal network; therefore the systems on the internal network
cannot construct direct routes to the internet.
DMZ NETWORK:
What is Demiltarized Zone?
shravanimjagtap13
Read
Discuss
Demilitarized zones, or DMZ for short, are used in cybersecurity. DMZs
separate internal networks from the internet and are often found on
corporate networks. A DMZ is typically created on a company’s internal
network to isolate the company from external threats. While the name might
sound negative, a DMZ can be a helpful tool for network security.
The DMZ is a network barrier between the trusted and untrusted network in
a company’s private and public network. The DMZ acts as a protection layer
through which outside users cannot access the company’s data. DMZ receives
requests from outside users or public networks to access the information,
website of a company. For such type of request, DMZ arranges sessions on
the public network. It cannot initiate a session on the private network. If
anyone tries to perform malicious activity on DMZ, the web pages are
corrupted, but other information remains safe.
The goal of DMZ is to provide access to the untrusted network by ensuring
the security of the private network. DMZ is not mandatory, but a better
approach to use it with a firewall.
Advantages Disadvantages
Key features:
• A DMZ provides a buffer from the outside world for your computer
systems. When you create a network, you must decide where your
computer systems will reside.
• Creating a buffer zone between your systems and the internet allows
you to function normally without being susceptible to external
attacks. Keeping your internal systems inside a DMZ also makes it
difficult for hackers to steal data or cause disruptions on company
networks. For this reason, most organizations use a DMZ when
creating secure computer systems.
• A DMZ provides a target for ethical hackers. Hackers often seek out
companies with weak computer security; this is why many
organizations use a DMZ to protect their internal systems.
• Companies that have strong security measures typically don’t create
vulnerabilities in their networks by demilitarizing zones on their own
computers or in their IT environments.
• The DMZ makes it easy for ethical hackers to find vulnerabilities
and gain access to designated targets once they’re inside the buffer
zone. By knowing which systems have weak security and then
targeting them, ethical hackers can perform necessary maintenance
without damaging company networks further.
Conclusion:
Demilitarized zones provide buffers between internal computers and the
internet. They can also be used as targets when performing hacking tasks such
as pretesting or social engineering. Finally, demilitarized zones may also be
used for physical penetration tests.