Page 140 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 140

Information  Security and Privacy




                    Notes          examines packets traveling into and out of the network. The device then verifies a list of previously
                                   mentioned access rules to observe if it should permit the packet to carry on to its destination, or
                                   if the packet should be unnecessary. There are a number of benefits to by means of hardware
                                   firewalls. The devices do not rely on general operating systems, for instance Microsoft Windows
                                   or Linux, so they are resistant to  the seemingly infinite number  of bugs,  viruses, and other
                                   malicious attacks that those operating systems undergo from. Hardware firewalls also carry out
                                   much improved (faster) than a  software dependent solution, and are much  more scalable  –
                                   additional devices can be added as required with relative simplicity. Performance should be one
                                   of the key considerations when choosing a firewall solution because of the fact that all network
                                   traffic traveling into and out of the organization’s network will pass via the device and it takes
                                   time and processing overhead to examine each packet to determine what requires to be done
                                   with it. Another benefit is that hardware firewalls only perform firewall associated duties and
                                   are not loaded with other tasks. This type of single-purpose functionality permits these hardware
                                   devices to execute their designed tasks much more successfully than a multi-function software
                                   dependent solution. Counter to the benefits, hardware firewalls also undergo from a number of
                                   disadvantages.


                                        Example: If the device goes down, all inbound and outbound network traffic discontinues,
                                   which can be operationally intolerable to an organization. Also, due to their proprietary nature,
                                   hardware firewalls need specialized knowledge to install, configure, and administer efficiently.
                                   Lastly, the financial costs of hardware based solutions are fairly high because of initial acquisition
                                   in addition to the previously mentioned specific administrative resources necessary to function
                                   them.

                                   Self Assessment


                                   Fill in the blanks:
                                   14.  ........................ firewalls are precisely what the name entails; a hardware device that  is
                                       positioned anywhere in the traffic flow of an organization’s network.

                                   15.  ........................ is one of the key considerations when choosing a firewall solution.
                                   9.8 Summary


                                      A firewall is a dedicated appliance, or software  running on another computer,  which
                                       inspects network traffic passing through it, and denies or permits passage based on a set of
                                       rules.
                                      Firewalls are frequently used to prevent unauthorized Internet users from accessing private
                                       networks connected to the Internet, especially intranets.
                                      A firewall is simply a program or hardware device that filters the information coming
                                       through the Internet connection into your private network or computer system.

                                      In computer  networking, Demilitarized  Zone  (DMZ)  is a  firewall  configuration for
                                       protecting local area networks (LANs).
                                      Firewall proxy servers function at the application layer of the firewall, where both ends of
                                       an association are forced to carry out the session through the proxy.
                                      A screening router is a fundamental part of most firewalls. A screening router can be a
                                       commercial router or a host-based router with some sort of packet filtering potential.
                                      An application gateway is an application program that runs on a firewall system between
                                       two networks. It is also known as application proxy or application-level firewalls.



          134                               LOVELY PROFESSIONAL UNIVERSITY
   135   136   137   138   139   140   141   142   143   144   145