Firewalls: Preventing Unauthorized Access Into a Network

961 Words2 Pages

Firewalls are used in businesses to help prevent attacks, mitigate security issues, and provide a sense of known security for the organization. Firewall characteristics are generally the same from firewall brand or vendor to another in that they provide authorized access only into a network. This review will look into the common security features that are present within firewalls and how they are used in daily functions to help prevent issues that threaten organizations. Firewalls work by preventing unauthorized access into a network by monitoring and enabling / disabling traffic via security policies and procedures. Grimes states, “Firewalls work by inspecting and filtering packet traffic between two networks. Firewalls are categorized according to the layer of the Open System Interconnection (OSI) model that they inspect. Most firewalls are packet filters, meaning they work at the network layer of the OSI model and make logic decisions based on the packet's IP addresses (source and destination), IP port numbers, and whether the packet is in UDP or TCP format. Circuit-layer firewalls work at the transport layer of the OSI model and inspect host-session information. Circuit-layer firewalls can block packets based on the host name and other IP session information such as flags and sequencing numbers” (Grimes, 2003). Some recent firewalls even include autoban features that help monitor network activity and autoban a point of entry (often IP address or port) that alleviates known attacks or patterns of attacks such as DDOS. Many firewalls now include monitoring and reporting activities to alert Information technology staff that an issue is or has occurred and what steps were taken automatically by the firewall to prevent the issue. ... ... middle of paper ... ...h as viruses or tracking mechanisms, and more. Newer software based firewalls have built in technology that helps in this type of filtering upon initial implementation. McAffee’s newest software firewall provides several filtering characteristics including folder and file encryption check on traffic exchange, social network protection, and more. Other characteristics include functionality to block questionable websites in over 35 categories, block file sharing and peer to peer networking protocols, monitor encrypted site activity, and more. (McAffee, 2014). References Grimes, Roger. (2003). Types of Firewall Filters. Windows IT Pro. http://windowsitpro.com/security/types-firewall-filters McAffee. (2014). http://home.mcafee.com/store/total-protection ZoneAlarm. (2014). What makes a good firewall. http://www.zonealarm.com/security/en-us/firewall/good-firewall.htm

More about Firewalls: Preventing Unauthorized Access Into a Network

Open Document