This literature review explores the importance of firewalls in network security and the different types of firewalls architecture. It also discusses the best firewall architecture for an organization and the role of firewalls in protecting organizational data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Literature review on Firewalls Name Institution Professor Course Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract Security of the organizational data should be given the highest priority because it is one of the most valuable assets. The security of the data is dependent on infrastructure design and protectionmethodologyimplementedbythespecificorganization.Implementationofthe firewall in the organizational IT infrastructure serves to protect unauthorized access of data. A firewall analyzes and filters all incoming and outgoing signals to ascertain whether they are authentic. The nature of the firewall should be validated to make sure it can filter data packets as well as check the content of the packet to prevent malware infection. Firewalls can either be hardware or software depending on the decision made by organizational management. There are different types of firewalls such as packet filtering, circuit-level gateway, stateful inspection, and proxy firewalls. These firewall architecture can secure corporate network with all security standards. The main goal of all these types of firewalls is to offer secure network and data protection in an organization.
Table of Contents Abstract......................................................................................................................................................2 Introduction...............................................................................................................................................4 Hardware firewalls....................................................................................................................................5 Software firewalls......................................................................................................................................5 Different types of firewalls architecture..................................................................................................6 The best firewall architecture for an organization..................................................................................8 Importance of firewalls in network security............................................................................................9 Conclusion................................................................................................................................................10 References................................................................................................................................................11
Introduction Information Technology (IT) infrastructure in an organization should be well structured and protected to make sure the security of organizational data is guaranteed. It is important to make sure all access to both the data and network are protected through the use of the firewalls. The study remainsvery importantbecauseit highlightsorganizationalnetwork and data protection strategies through use of firewalls.Implementation of firewalls in an organizational network for network and data security can be done on either software or hardware form. In today’s technological world, IT administrators should be on the same phase with technology to avert data threats (Dandamudi & Eltaeib, 2015). Data threats can range from malicious software attacks and hacking from within or outside the organization. To prevent and keep track of all organizational activities, firewalls would serve as the best tool to capture audit trails and avoid any unauthorized penetration into the network. In cases of a data breach from within or outside the organization, IT administrators should be able to use data packets captured by firewalls to trace the perpetrators. On the same note, through the use of firewalls, all signals should be monitored,analyzedandverifiedbeforeenteringorleavingtheorganizationalnetwork (Amalina, Alsaqour, Uddin, Alsaqour & Al-Hubaishi, 2013). Important to note is that with intelligent firewalls, it is possible to monitor network bandwidth usage and assign a specific limit to individuals.This article focus on the organizational network and data protection through the use of firewalls. It would highlight network protection and network signal monitoring from within the organization would be addressed. This cannot be achieved without having a distinctive evaluation of IT administrators’ roles and tools to help in monitoring and troubleshooting the network. The sources to be used would be scholarly articles not more than 10 years old from date of publication.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Hardware firewalls It is evident that in our daily activities while on the internet, being blocked by firewalls from accessing some sites has been a common phenomenon. These firewalls are either installed on our laptops, workstations or organizational network servers. The main goal of any firewall is to inspect and filter all data packets and signals as they enter or leave the device. Authentic data packets are allowed into the organizational network while non-authentic data packets are dropped. Hardware firewall offers network security by protecting the perimeter of the network since it resides from outside the network server (Tharakaet al., 2016). Despite residing from outside the network server, it has to be connected to the server of the uplink to offer required security. In case the setup involves the interconnection of a new production server, maintenance window can be set up to handle other required physical connections. Once all connections and configurations are established, all incoming and outgoing traffic is routed through the firewall. At some instances, hardware firewalls can handle traffic from more than one server. Hardware firewalls are usually provided by service providers and the only aspect that specific users are required to make personal configurations to meet organizational needs. Software firewalls These are specialized firewalls which are designed to run on other generic hardware or Operating System (OS’s). When using software-based firewalls, it is up to the IT administrator to choose the nature of the hardware to implement (Salaria & Madaan, 2014). An excellent example of a software firewall is ISA Server 2004 which can run on a personal laptop that support either
windows server 2000 and 2003. The requirement of running software firewalls is to buy the software package which can be installed on any other supported OS. Once software firewalls are installed on any device such as a server or computer, they are configured to meet specific user or organizational requirements. The software patches and updates should be completely rolled out. Once software firewalls are installed and configured, their functionality is the same as hardware firewalls. They can analyze, filter data packet signals and make the decision on whether it meets all the checks. Once the data packet meets all security requirements, it is allowed to enter into the organizational network. On the same note, unauthenticated data packets are dropped to prevent inappropriate data access into the corporate data (Hayajneh, Mohd, Itradat & Quttoum, 2013). In some instances where an organization decides to add extra firewalls for security purpose, it is highly recommended to disable already existing one to avoid any conflict that may arise. Different types of firewalls architecture It is obvious that organizations struggle to make their ends with the best tools to protect their data or the network. Besides the firewall being a standard tool in protecting organizational sensitive data and network, some IT administrators' find it challenging to choose the best firewalls (Vogel, 2015). To make a choice on the best firewall, it is essential to understand there are a variety of the network. Firewalls can be categorized into; packet-filtering firewalls which are regarded to be universal. Packet filtering is able to create monitoring checkpoint on either an intelligent switch or router. It can inspect information such data packets such as source and destination IP address, the nature of the packets being broadcasted, port numbers being sending or receiving packets and any other security checks. To perform all these data packet checks, packet-filtering firewalls do not need to open the content of the data packet. In cases where the broadcasted data packet does not meet the required security checks, it has to be dropped. The
packet-filtering firewalls are not resource-intensive as they offer minimal impact on overall system performance (Cropper, Ullrich, Fruhwirt & Weippl, 2015). However, these type of firewalls are not secure as they are simple to bypass. Next, stateful inspection firewalls make use of packet inspection technology and Transmission Control Protocol (TCP). The handshake verification of packet inspection creates a high level of both data and network protection. Stateful firewalls are resource intensive and may cause some downtime on packet transfer. Additionally, circuit-level gateways are also regarded to be one of the simple form of firewalls which are used to either grant or deny data signals access without having many considerations. They are not resource intensive as they are mandated to make validation of TCP handshake during data packet transmission (Gopalakrishnan, Govindarasu, Jacobson, & Phares, 2013). The Transmission Control Protocol (TCP) handshake checks are meant to make sure that the session of the transmitted packet has been broadcasted from a legitimate source. Besides being resource effective, circuit-level gateway firewalls do not check the content of the packet being transmitted. Important to note is that since no content is checked, it can be possible for the firewall to allow malware hidden in the packet content. In the world dominated by a malware infection, the circuit-level gateway does not offer sufficient data and network protection., next-gen and application-level gateways. Finally, proxy firewalls which are commonly known as application-level gateways run on the application layer of Open System Interconnection (OSI) network model. It is used to filter all incoming signals from destination and subjected network in the organization. In this regard, proxy firewalls must establish a packet source connection of the traffic and do some inspection on all incoming data packets. According to Roozbahani & Azad (2015), the proxy firewall can perform an in-depth analysis of the packet by checking the actual content of the data packet to verify no malware are hidden in the content. Once all checks have
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
been done, the proxy firewall sends it off and creates an additional layer that does separation between networked client and individual device. The obstruction of the data packets is usually done to create extra anonymity in the process of protecting the network. Due to increased processes involved in the transmission of the data packet, proxy firewalls can be resource intensive compared to other firewalls. The best firewall architecture for an organization During the survey, analysis to evaluate the firewall that best suites organizational needs, IT administrator have to decide which firewall offer the best protection. The choice of the firewall depends entirely on the goals of the organization and resources available to support required operations. The main focus should be to determine capability to use only one firewall, but none of the firewalls can offer comprehensive network and data protection (Kamara, Fahmy, Schultz, Kerschbaum & Frantzen, 2013). To provide the quality protection to organizational data, multiple layers of firewalls can be implemented at various network levels and the perimeter. Implementation of more than one firewall in the network at different levels makes the organizational network more resilient to vulnerable attacks. In this regard, it is essential to highlightthatthechoiceofthefirewallbyanorganizationwoulddependonnetwork capabilities, industry compliance requirements, and available resources to manage any chosen firewall. For organizations that offer delicate services, proxy firewalls would be the best since it providesadditionaloperationalfeaturestosecure organizationaldata.In caseswherean organization cannot depend on the implementation of a single firewall, several security measures can be implemented at each network subnet (Arneja & Sachdev, 2015). By creating a centric nature of the network and implementing a firewall at each layer, the organizational data would be very secure because several firewalls would protect it.
Importance of firewalls in network security Organizationalnetworkdataandnetworkthreatshavebeenontherisedueto technologicalcapabilitytobreakintothenetworkwithouthavingproperauthorization. Considering almost all business activities are done on the internet, networks are on the verge of being attacked in an attempt to intercept and siphon some data (Alabady, 2009). In this regard, data protection becomes an essential aspect because it helps protect business assets as this is the primary goal in any network protection. Data has turned out to be one of the most valuable assets in the organization because it is used in making the sensitive organizational decision which determines the viability of the organization. Network security is the key because it helps to protect data, offer secure information access from within and outside the organization and offer dataintegrity.Similarly,networkprotectioninanorganizationhelpstocomplywith internationalregulatoryrequirements.Informationsystemsecurityshouldnotbelefton individual organization because all organization is dependent on each other. To make sure organizational data is secure, all organizations and international bodies' should liaise and have formulated general standardsthat organizationshave to comply. Further, a safe working environment increases collaboration among workers as well as facilitate communication among business entities. It builds confidence among transacting parties that data exchange is secure and confidential (Wankhade & Chatur, 2014). Secure business environment reduces operational risks which in turn lowers security breaches and other costs such as legal activities which are quite expensive for small businesses. Finally, securing network helps an organization gain competitive operational advantages. By developing a secure and effective network, security measures in an organization offer competitive advantage due to trust business partners have in data exchange.
Conclusion Organizational data security and confidentiality remain to be a critical factor in the modernworld.ITinfrastructureinanyorganizationshouldbeprotectedtomakesure confidential data is not released to unauthorized people. Network protection in organizations forms the basis of data security because most of today's business process is done over the internet. Once network security is guaranteed, it is presumed that the entire organizational data is secure. In this regard, corporate network and data protection has to be implemented through the use of firewalls. The firewall chosen by an organization can either be hardware or software related. The main goal of using firewalls in securing the network is to analyze and filter all incoming and outgoing data packet signals. Considering the nature of security threats posed by hackers and malware infection, the firewall offers an opportunity to determine which signal is genuine and authentic. The data packet should be analyzed to determine its source and the destination. In cases where a firewall is unable to determine the authenticity of the data packet, it has to be dropped. The nature of the firewall chosen should be able to satisfy organizational requirements. The goal and the international security standards that an organization must meet serve as the driver to the selection of firewall by an organization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network.Int. Arab J. e-Technol.,1(2), 26-36. Amalina, N., Alsaqour, R., Uddin, M., Alsaqour, O., & Al-Hubaishi, M. (2013). Enhanced network security system using firewalls.ARPN Journal of Engineering and Applied Sciences. VOL.8, NO. 12, 999-1003. Arneja, P. S., & Sachdev, S. (2015). Detailed Analysis of Antivirus based Firewall and Concept ofPrivateCloudAntivirusbasedFirewall.InternationalJournalofComputer Applications,111(4), 16-22. Cropper, J., Ullrich, J., Frühwirt, P., & Weippl, E. (2015). The role and security of firewalls in iaas cloud computing. In2015 10th International Conference on Availability, Reliability, and Security, 1(1), pp. 70-79. Dandamudi, S., & Eltaeib, T. (2015). Firewalls Implementation in Computer Networks and Their Role in Network Security.J. Multidiscip. Eng. Sci. Technol,2(3), 408-411. Gopalakrishnan, K., Govindarasu, M., Jacobson, D. W., & Phares, B. M. (2013). Cybersecurity for airports.International Journal for Traffic and Transport Engineering,3(4), 365-376. Hayajneh, T., Mohd, B. J., Itradat, A., & Quttoum, A. N. (2013). Performance and information security evaluation with firewalls.International Journal of Security and Its Applications, SERSC,7(6), 355-372. Kamara, S., Fahmy, S., Schultz, E., Kerschbaum, F., & Frantzen, M. (2013). Analysis of vulnerabilities in internet firewalls.Computers & Security,22(3), 214-232. Roozbahani,F.S.,&Azad,R.(2015).Securitysolutionsagainstcomputernetworks threats.International Journal of Advanced Networking and Applications,7(1), 2576. Salaria, E. S., & Madaan, E. N. (2014). Firewall and Its Policies Management.International Journal of Computer Science and Mobile Computing,3(4), April- 2014, pg. 359-367 Tharaka, S. C., Silva, R. L. C., Sharmila, S., Silva, S. U. I., Liyanage, K. L. D. N., Amarasinghe, A.A.T.K.K.,&Dhammearatchi,D.(2016).High-SecurityFirewall:Prevent UnauthorizedAccess Using Firewall Technologies.International Journal of Scientific and ResearchPublications,6(4), 504-508. Vogel, J. D. (2015). Using Software Defined Networking To Solve Missed Firewall Architecture In Legacy Networks.International Journal of Network Security & Its Applications (IJNSA), 3(6), 59-79.
Wankhade, A., & Chatur, P. N. (2014). Comparison of Firewall and Intrusion Detection System.International Journal of Computer Science and Information Technologies,5(1), 674-678.