logo

Firewall Security and Implementation in Cyber Security

   

Added on  2023-01-12

21 Pages7721 Words39 Views
Cyber Security

ABSTRACT
Cyber Security is one of the most severe and menacing issue which is associated with
unethical and inappropriate access, as well as usage of one’s data that is stored within the
Firewall computing software. Moreover, this act and threat usually arises for personal gains or
even for vendettas. Hence, the paper below discusses the Firewall security and is divided into
separate tasks to help in getting a better insight within the report.
The first task of the report would be addressing how Firewall computing implements cyber
security, for which the dynamics of Firewall computing are explored and the requirements of this
task is fulfilled. Furthermore, the second tasks is related to the vulnerabilities and risks
associated in Firewall computing. Within this, certain risks and vulnerabilities associated with
firewalls are discussed. In addition to this, the third task the techniques that are used by attackers
to overcome Firewall computing technologies are discussed, which explores methods like
hacking, malware and so forth. Moreover, this task also takes into account several
countermeasures to provide better security to Firewall computing systems, which explores a
better and more effective functioning of firewalls. The last task of this paper highlights the key
features of policy that would mitigate risks in Firewall computing, for which Information
Security Policy has been discussed in detail.

Table of Contents
ABSTRACT.....................................................................................................................................2
INTRODUCTION...........................................................................................................................4
TASK 1............................................................................................................................................5
IMPLEMENTATION OF SECURITY BY FIREWALLS.............................................................5
What is firewalls and How firewalls implement cyber security?................................................5
RISKS AND VULNERABILITIES OF FIREWALLS...................................................................8
Risks in firewalls.........................................................................................................................8
Vulnerabilities in firewalls.........................................................................................................10
TECHNIQUES AND COUNTERMEASURES...........................................................................11
Techniques used by attackers to overcome firewall security....................................................11
Countermeasures to the risks.....................................................................................................13
Effectiveness of Both Systems..................................................................................................14
INFORMATION SECURITY POLICY.......................................................................................15
Outlining the key features of a policy that would mitigate or prevent risks to firewalls...........15
CONCLUSION..............................................................................................................................19
REFERENCES..............................................................................................................................20

INTRODUCTION
Cyber security is a very important and Critical area for business is and an organisation
flourishing in the market as cybercrime is regularly increasing and aggressively growing. As
known that technology is a blessing and a curse both for the users because it is basically day to
day part of every individual’s lives but several malicious elements make negative and harmful
use of technology for their personal growth which hinders and harms several businesses and
people(Bada, Sasse and Nurse, 2019). Cyber security refers to the body of technologies
processes and practices designed and created for protecting the networks systems programs
devices and the data from hackers and unauthorised attackers. Cyber security is also defined as
information technology security. Cyber security is very important as the data stored with
government military financial corporate and medical organisations and their computer systems
and other devices is very critical and harmful. The report it is based on a Cybersecurity tool
known as firewalls which is a technology developed and designed for keeping the attackers out
of the systems of the users and provide in security to the data available with the organisations.
The report covers and focuses on several different areas related to Cybersecurity and firewalls. In
the very beginning the focus is on understanding the tool of firewalls which is a software and
hardware developed for protecting the networks from any malicious attacker. Several types of
firewalls which are flourishing in the market are defined and described along with the
implementation of firewalls on cyber security. Moreover, the risks and vulnerabilities associated
with firewalls and its programs are also analysed along with highlighting on different steps to
reduce their impact and mitigate the risk (Sun, Hahn and Liu, 2018). Furthermore Different
techniques which are used by attackers and hackers to overcome the firewall security are
identified and explained. Along with it different countermeasures to these risks and techniques
which can be used by attackers for breaching the firewall security also highlighted along with the
effectiveness of both the attacking techniques and to the countermeasures. At the end several key
features of the policies that would mitigate or prevent the risk two firewalls are described and
mentioned in the report.

TASK 1
IMPLEMENTATION OF SECURITY BY FIREWALLS
What is firewalls and How firewalls implement cyber security?
Firewalls is a system designed preventing and protecting any unauthorised access from a
private network. Firewalls can be implemented in any of the three ways that is hardware and
software also in a combination of both. Firewalls is a software or hardware that prevents any
unethical or unauthorized internet user or attacker from accessing any private networks
connected with internet and more especially keeps safe the intranet networks. There are several
messages which enters and leaves the intranet of a company which is a local Network used by 8
to be connected with all the people associated with the organisation (Xin and et. al., 2018). The
different messages and data which is entering and exiting the internet of the company must pass
through the firewall which take care and examine each single packet of information and
messages. The firewalls block those packets of information or data passes through the intranet,
those who do not meet the specified security criteria by the company. A firewall is considered to
be one of the finest and first line of defence sir in protecting private information messages and
data of companies but it cannot be considered the only such line of protecting data. The firewalls
are generally developed and designed for protecting the network traffic and connection and
therefore do not attempt or make efforts to authenticate individual users while determining who
can access a particular computer for a particular network.
Implementation of firewalls cyber security:
Firewalls carefully analyses all the incoming traffic on a system or on a network based on
pre-established rules filters and security information. The analysis and evaluation of incoming
traffic enables the firewalls to identify the source of the traffic and determine it into a secured or
unsecured source in order to prevent any breaches in the system by unauthorised parties and
attackers(Mosca, 2018). Firewalls work as a guard of traffic at computer system and network at
the entry point of it which are called as ports. These ports are the entry points of a network is the
place where information is exchanged with external devices for example, “source address
172.18.1.1 is allowed to reach the destination 172.18.2.1 over port 22”. The IP addresses of a
computer system and software is considered as a house and the port numbers are considered as
the rooms within the house. In these houses only trusted people that is trusted source addresses

are allowed to enter the house and that is the destination address. Months the trusted source
address is entered in the destination then it’s for the filtered so that the source address is only
allowed to access certain information from certain destination ports depending on the
authenticity and security measures of the port. The owner of the boats are allowed to access all
the sources of different ports while the other parties who are associated with the network and
company are allowed in certain specific sports according to their security measures and traffic
filters (Liu, and et. al., 2018).
As known and discussed that firewalls can be implemented in three manners that is either as a
software or as a hardware and the third option is one of the best option to have both that is to
have a combination of software and hardware firewalls. A software firewall is a program which
is installed on the computer systems and networks of company which regulates all the traffic
through specific port number and applications. On the other hand the hardware firewalls which is
a physical firewall is a piece of equipment that is installed between the networks and gateway of
the company. There are several different types of fire was available in the marketplace which can
be implemented and installed by organisations in their computer Network and systems for
keeping the unauthorised attackers out of their systems allowing company to secure and protect
their personal information and all authenticated data. Several different types of firewalls are as
follows and mentioned below in the next section of the report.
Types of firewalls:
Packet-filtered firewalls: the packet filter firewalls are the most common type of
firewall which are basically developed for examining the packets and messages entering
the port and prohibit them from passing through if did not matches any established
security rule set. The packet filtering firewall checks the source of the packet and the
prescribed destination with the help of IP addresses (Gratian and et. al., 2018). Once the
packet matches the security rule sets then the packet filter firewalls allows the package to
travel and enter the network as it is trusted to enter otherwise the firewall denies the entry
of packet. Packet-filtered firewalls are basically divided into two categories which are
statefuland stateless. The statefulfirewall remembers all the information about previously
passed packets and considered much more secured and protected. On the other hand the
state less firewalls are entirely opposite and examine the packets independently of one
another and lack the context making them easy targets for the hackers and unauthorised

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security and Implementation of Security by Firewalls
|20
|7369
|33

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Network Security Analysis: Cyber Security
|10
|1925
|30

(PDF) Assignment on Cyber Security
|5
|856
|225

Developing Information Security Policies for Xero
|14
|4396
|167

MGMT6013 Managing Information System | Security Policy
|14
|4311
|36