Cloud Computing Security: Firewall, Risks, and Policy Report

Verified

Added on  2023/01/12

|20
|7369
|33
Report
AI Summary
This comprehensive report delves into the critical domain of cybersecurity, with a specific focus on cloud computing and the role of firewalls. It begins by defining cybersecurity and highlighting its importance in protecting sensitive data. The report then dissects the implementation of firewalls, explaining their functionality in safeguarding networks against unauthorized access. It explores various firewall types, including packet-filtered, next-generation, proxy, and NAT firewalls, detailing their respective strengths and applications. A significant portion of the report addresses the inherent risks and vulnerabilities associated with firewalls, such as insider attacks and misconfigurations. It proceeds to analyze techniques employed by attackers to overcome firewall security, including hacking and malware, while also discussing effective countermeasures. Furthermore, the report outlines key features of information security policies designed to mitigate risks in cloud computing environments. Overall, the report provides a thorough overview of cybersecurity challenges and solutions, emphasizing the critical importance of firewalls and robust security policies in the digital age.
Document Page
Cyber Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ABSTRACT
Cyber Security is one of the most severe and menacing issue which is associated with
unethical and inappropriate access, as well as usage of one’s data that is stored within the cloud
computing software. Moreover, this act and threat usually arises for personal gains or even for
vendettas. Hence, the paper below discusses the cloud computing security and is divided into
separate tasks to help in getting a better insight within the report.
The first task of the report would be addressing how cloud computing implements cyber
security, for which the dynamics of cloud computing are explored and the requirements of this
task is fulfilled. Furthermore, the second tasks is related to the vulnerabilities and risks
associated in cloud computing. Within this, certain risks and vulnerabilities associated with
firewalls are discussed. In addition to this, the third task the techniques that are used by attackers
to overcome cloud computing technologies are discussed, which explores methods like hacking,
malware and so forth. Moreover, this task also takes into account several countermeasures to
provide better security to cloud computing systems, which explores a better and more effective
functioning of firewalls. The last task of this paper highlights the key features of policy that
would mitigate risks in cloud computing, for which Information Security Policy has been
discussed in detail.
Document Page
Table of Contents
ABSTRACT....................................................................................................................................2
INTRODUCTION...........................................................................................................................4
TASK 1............................................................................................................................................5
IMPLEMENTATION OF SECURITY BY FIREWALLS.............................................................5
What is firewalls and How firewalls implement cyber security?................................................5
RISKS AND VULNERABILITIES OF FIREWALLS..................................................................8
Risks in firewalls.........................................................................................................................8
Vulnerabilities in firewalls........................................................................................................10
TECHNIQUES AND COUNTERMEASURES...........................................................................11
Techniques used by attackers to overcome cloud computing security......................................11
Countermeasures to the risks.....................................................................................................13
Effectiveness of Both Systems..................................................................................................14
INFORMATION SECURITY POLICY.......................................................................................15
Outlining the key features of a policy that would mitigate or prevent risks to firewalls..........15
CONCLUSION..............................................................................................................................18
REFERENCES..............................................................................................................................19
Document Page
INTRODUCTION
Cyber security is a very important and Critical area for business is and an organisation
flourishing in the market as cybercrime is regularly increasing and aggressively growing. As
known that technology is a blessing and a curse both for the users because it is basically day to
day part of every individual’s lives but several malicious elements make negative and harmful
use of technology for their personal growth which hinders and harms several businesses and
people(Bada, Sasse and Nurse, 2019). Cyber security refers to the body of technologies
processes and practices designed and created for protecting the networks systems programs
devices and the data from hackers and unauthorised attackers. Cyber security is also defined as
information technology security. Cyber security is very important as the data stored with
government military financial corporate and medical organisations and their computer systems
and other devices is very critical and harmful. The report it is based on a Cybersecurity tool
known as firewalls which is a technology developed and designed for keeping the attackers out
of the systems of the users and provide in security to the data available with the organisations.
The report covers and focuses on several different areas related to Cybersecurity and firewalls. In
the very beginning the focus is on understanding the tool of firewalls which is a software and
hardware developed for protecting the networks from any malicious attacker. Several types of
firewalls which are flourishing in the market are defined and described along with the
implementation of firewalls on cyber security. Moreover, the risks and vulnerabilities associated
with firewalls and its programs are also analysed along with highlighting on different steps to
reduce their impact and mitigate the risk (Sun, Hahn and Liu, 2018). Furthermore Different
techniques which are used by attackers and hackers to overcome the firewall security are
identified and explained. Along with it different countermeasures to these risks and techniques
which can be used by attackers for breaching the firewall security also highlighted along with the
effectiveness of both the attacking techniques and to the countermeasures. At the end several key
features of the policies that would mitigate or prevent the risk two firewalls are described and
mentioned in the report.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TASK 1
IMPLEMENTATION OF SECURITY BY FIREWALLS
What is firewalls and How firewalls implement cyber security?
Firewalls is a system designed preventing and protecting any unauthorised access from a
private network. Firewalls can be implemented in any of the three ways that is hardware and
software also in a combination of both. Firewalls is a software or hardware that prevents any
unethical or unauthorized internet user or attacker from accessing any private networks
connected with internet and more especially keeps safe the intranet networks. There are several
messages which enters and leaves the intranet of a company which is a local Network used by 8
to be connected with all the people associated with the organisation (Xin and et. al., 2018). The
different messages and data which is entering and exiting the internet of the company must pass
through the firewall which take care and examine each single packet of information and
messages. The firewalls block those packets of information or data passes through the intranet,
those who do not meet the specified security criteria by the company. A firewall is considered to
be one of the finest and first line of defence sir in protecting private information messages and
data of companies but it cannot be considered the only such line of protecting data. The firewalls
are generally developed and designed for protecting the network traffic and connection and
therefore do not attempt or make efforts to authenticate individual users while determining who
can access a particular computer for a particular network.
Implementation of firewalls cyber security:
Firewalls carefully analyses all the incoming traffic on a system or on a network based on
pre-established rules filters and security information. The analysis and evaluation of incoming
traffic enables the firewalls to identify the source of the traffic and determine it into a secured or
unsecured source in order to prevent any breaches in the system by unauthorised parties and
attackers(Mosca, 2018). Firewalls work as a guard of traffic at computer system and network at
the entry point of it which are called as ports. These ports are the entry points of a network is the
place where information is exchanged with external devices for example, “source address
172.18.1.1 is allowed to reach the destination 172.18.2.1 over port 22”. The IP addresses of a
computer system and software is considered as a house and the port numbers are considered as
the rooms within the house. In these houses only trusted people that is trusted source addresses
Document Page
are allowed to enter the house and that is the destination address. Months the trusted source
address is entered in the destination then it’s for the filtered so that the source address is only
allowed to access certain information from certain destination ports depending on the
authenticity and security measures of the port. The owner of the boats are allowed to access all
the sources of different ports while the other parties who are associated with the network and
company are allowed in certain specific sports according to their security measures and traffic
filters (Liu, and et. al., 2018).
As known and discussed that firewalls can be implemented in three manners that is either as a
software or as a hardware and the third option is one of the best option to have both that is to
have a combination of software and hardware firewalls. A software firewall is a program which
is installed on the computer systems and networks of company which regulates all the traffic
through specific port number and applications. On the other hand the hardware firewalls which is
a physical firewall is a piece of equipment that is installed between the networks and gateway of
the company. There are several different types of fire was available in the marketplace which can
be implemented and installed by organisations in their computer Network and systems for
keeping the unauthorised attackers out of their systems allowing company to secure and protect
their personal information and all authenticated data. Several different types of firewalls are as
follows and mentioned below in the next section of the report.
Types of firewalls:
Packet-filtered firewalls: the packet filter firewalls are the most common type of
firewall which are basically developed for examining the packets and messages entering
the port and prohibit them from passing through if did not matches any established
security rule set. The packet filtering firewall checks the source of the packet and the
prescribed destination with the help of IP addresses (Gratian and et. al., 2018). Once the
packet matches the security rule sets then the packet filter firewalls allows the package to
travel and enter the network as it is trusted to enter otherwise the firewall denies the entry
of packet. Packet-filtered firewalls are basically divided into two categories which are
statefuland stateless. The statefulfirewall remembers all the information about previously
passed packets and considered much more secured and protected. On the other hand the
state less firewalls are entirely opposite and examine the packets independently of one
another and lack the context making them easy targets for the hackers and unauthorised
Document Page
attackers. The packet filtering firewall are effective as the ultimate Lee provide very basic
protection and can be very limited.
Next generation firewalls (NGFW)-the next generation firewalls are the results of
updated technology and revolutionary changes taking place in the technical world. The
next generation firewall is basically a combination of traditional firewall technology with
additional functionality according to the updated technologies such as encrypted traffic
inspection intrusion prevention system, antiviruses and many more. the next generation
firewalls are most notably includes deep packet inspection in comparison with other basic
firewalls only look at packet headers. The deep packet inspection examine the data within
the packet itself and assist uses to more effectively identify and categorise the packet so
that it can stop a malicious data to enter the network of the company(Shoemaker, Kohnke
and Sigler, 2018).
Proxy firewalls- The proxy firewalls certainly filter the network traffic at very beginning
and at the application level. The proxy firewalls act an intermediary between two ends of
the system. The clients or the users or the companies using the proxy firewalls send a
request to the firewall there it is then evaluated and analysed against a set of rules and
then permitted if the packet matches the security traffic blocked by the firewall. The
proxy firewall mostly monitor the traffic for layer 7 that is make deep packet inspection
protocols such as HTTP and FTP make use of both deep packet inspection and state full
to detect malicious traffic and to stop the entry of unprotected and unsecured network in
the systems of users.
Network address translation firewall (NAT)- The network address translation firewall
allows multiple devices with a sole and an independent network addresses to connect
with the internet using a simple and a single IP address and keeping all the other
individual IP addresses hidden (Hareide and et. al., 2018). This firewall protects all the IP
addresses as the attacker scanning a network for IP addresses cannot capture a specific
detail and which provides a more and higher level of security against any malicious
attacker or hacker to the system. The network address translation firewall are kind of
similar to proxy firewalls but in that act as an intermediary between a group of computers
and outside traffic on the other hand this network address translation firewall allows
multiple devices to connect with the internet within a single IP address.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RISKS AND VULNERABILITIES OF FIREWALLS
Risks in firewalls
Firewalls are a fundamental piece of any organization's cybersecurity engineering. In any
case, firewalls alone ought to never be considered as the whole and sole answer for the
organization's cybersecurity needs. Indeed, they are helpful however there are a couple of issues
with firewalls that can make it a poorly conceived notion to just depend on this one security
apparatus to ensure the business. Here are some issues or risk associated with firewalls
mentioned below:
Insider Attacks: The perimeter of firewalls is developed for keeping up with the attack
that originate from the outside of the system and network. But the system do not protect
the network is the attack takes means from the inside. Typically the perimeter of firewall
feels and becomes useless when the attackers have already accessed to the system.
Therefore it is considered as the risk of firewall because it is specifically created for
keeping the system safe from the outside and not from the inside (Sabar, Yi and Song,
2018). Still even the attackers originate and reaches the system from the inside of the
networks firewall can still be e off some use and do some good but for that the business
has to have an internal firewalls on the top of their perimeter firewalls. This internal
firewalls helps in dividing the individual assets on the network which increases the
efforts of attackers for moving from one system to another enable in increasing the
breakout time of attackers.
Missed security patches: if the network firewall software is not managed properly the
issue of security patches arises and it is considered as a risk associated with firewalls
software. Every software program has some vulnerabilities which enhances the power of
attackers and enable them to exploit the system (Khalili, Naghizadeh and Liu, 2018).
When the vendors of firewall software discover these vulnerabilities associated with the
software they usually take measures and create a patch for fixing the problem as soon and
fast as possible. But the existence of a mere patch do not means that it automatically the
applied to the firewall program until then the vulnerability is still there and the attackers
can exploit it. The companies using the firewall software have a solution for this problem
and that is to create and stick to a very appropriate and strict patch management schedule
Document Page
under which they should check for all and any security updates for the system and make
sure that the supply of those updates are made as soon as possible.
Configuration mistake:even if a firewall software is placed on the network and all the
vulnerability patches are applied and updated by the organisation on the network there is
still a chance of creation of problem if the configuration settings of firewall software
generate any conflicts. This risk of firewall software can lead two laws of performance on
the net worth of the company and the firewall software out rightly fails to provide
protection to the system and networks. For instance, dynamic routing is a setting in a
firewall software that was long ago deemed as a bad idea because it resulted in a loss of
control on the system that reduces security and protection(Levi, Allouche and
Kontorovich, 2018). But some of the companies ignore it and leave it on which created
vulnerability for then in their firewall protection and caused a configuration mistake
attackers to enter and misuse their systems. Having a poorly configured firewall software
system is basically inviting the attackers and giving them the keys for entering into the
network by making things easier for them and spending time money and lot of efforts on
the security measures.
A lack of deep packet inspection:A deep packet inspection also known as layer 7
inspection is a very rigorous and strict inspection mode used by next-generation firewalls
to examine and inspect the contents of information for a data packet before approving or
denying that packet passage to or from a system. Every organisation and big user of
firewall software is suggested to undertake the packet inspection in order to be protected
and says against any unethical breach or entrance of third party in their networks. The
organisation or users using in less advanced firewall me simply check the data packets
their point of origin and destination before approving or a request which can be easily
spoofed off by attacker and enable them to track the networks off firewall in a easy way
without making any rigorous efforts. Therefore it is always suggested to organisation and
firewalls users in order to fix this problem is to make use of firewalls software that can
perform deep packet inspection which is rigorous in nature for checking all the data and
information packets for known malware so that the unnecessary package can be rejected
and more importantly the unethical breaches can be ignored with keeping the system and
network safe from any attackers (Porcedda, 2018).
Document Page
DDoS attack: The DDoS stands for Distributed Denial of Service and it is one of the
most commonly and frequently used attack strategy by the breachers for entering into the
software and stealing the data. This is the most common and frequently used strategy
because it is highly effective and potential in nature along with it the cost associated with
it in order to execute it is very low. The strategy works appropriately with the goal of
overwhelming the defenders resources and create a shutdown inability to deliver the
services. This is one category of attack which is a protocol attack designed to drain
firewall and load a balancer resource and information to keep them song processing
traffic. Firewalls software can mitigate some types of distributed denial of service attacks
but it is risky because they can still be overloaded by protocol attacks which empowers
the attacker and enable them to breach the network. The strongest part of distributed
denial of service attacks is they are not easy to fix and till date there is no appropriate
solutions for this kind of attack (Kure, Islam and Razzaque, 2018). This is because there
are several attack strategies that can leverage numerous weaknesses and flaws in the
organisations network structures.
Alone, firewalls cannot protect the system from the entry of the dangers and attacks that are
out there considered as drawbacks of enhancement of technology. They can fill in as a basic
piece of a bigger cybersecurity procedure to defend the business and the systems.
Vulnerabilities in firewalls.
Passwords are set to the default which makes each security issue conceivable, including
responsibility and accountability issues when network issues are occurring.
Anybody on the Internet can get to Microsoft SQL Server databases facilitated from the
inside which can lead them to inner database, particularly when SQL Server has the
default credentials or very weak passwords.
Firewall OS programming is obsolete and no longer supported this can encourage
realized events including remote code execution and forswearing of administration
assaults, and probably will not be great in eyes of others if a breach happens and it's made
realized that the framework was obsolete (Lee, 2018).
Anybody on the Internet can get to the firewall by means of decoded HTTP associations,
as these can be abused or mistreated by an outsider or a third party who is on a similar
system, for example, an open/decoded wireless system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Anti-spoofing controls are not empowered on the outside interface which can encourage
denial of administration and related assaults.
Rules exist without logging which can be particularly dangerous for basic frameworks
and administrations.
Any protocol and service can interface between inside system networks which can
prompt inner breaks and consistence breach or violation, particularly as it identifies with
PCI DSS cardholder information environments.
Anybody on the inside system can get to the firewall by means of unencrypted telnet
connections. These associations can be abused and misused by an internal party (or
malware) if ARP harming is enabled by means of an instrument, for example, the free
password recovery program Cain and Abel.
Any sort of TCP or UDP service can leave the system which can empower the spreading
of malware and spam and lead to worthy use and related arrangement infringement and
breaches (Leszczyna, 2018).
Rules exist with no documentation can make security the board issues, particularly when
firewall administrators leave the association suddenly.
Certainly, in businesses firewalls can help prevent the results when these vulnerabilities are
abused, for example denial of administration attacks realized by malware diseases and missing
patches, high transfer speed utilization identified with SQL infusion database dumps.
TECHNIQUES AND COUNTERMEASURES
Techniques used by attackers to overcome cloud computing security
Cloud Computing Security ensures that the information available with an individual or an
organisation within their cloud storage remains essentially secured in a way which protects the
privacy and confidential information about individuals and their personal, along with
professional lives.
However, there are various attackers who use different techniques in order to bypass or
overcome this security system and steal the data in an unauthorised and illegal manner.
Therefore, it becomes necessary to highlight and determine several methods and techniques
which are usually used by the same in order to ensure security against such threats. Therefore,
some of these technologies are explored below:
Document Page
Service or Account High jacking:One of the most commonly used techniques by
attackers in context of overcoming cloud computing security is the high jacking of
service or a person’s account. It is a state when the attacker could access the login
credentials of a person’s account, which could be obtained by coding, as well as hacking
the server of individuals. Hence, then it leads the attacker easily towards the data
uploaded within the cloud computing of an individual. Furthermore, despite of just
stealing data, they could also plant false evidences against these individuals in a
threatening manner which is a serious violation of a person’s privacy (Liu and et. al.,
2018). Denial-of-Service:Another threatening technique which is used by attackers is the
denial-of-service attacks, which has been evident since the popularity of cloud
computing have been on the initial stage. These are the attacks when the person
authorised for the access of data could not do the same due to blockages of complex
coding planted by attackers. These enhances the encryption level within the cloud
computing software which restricts the user from accessing and even viewing the data,
with possible chances of corruption of the information available within the storage units.
Malware:This is yet another grave act of security threat which is adopted as a technique
by attackers to overcome the cloud computing security. It is usually associated with
certain codes which are placed within the services performing cloud computing. These
operate within the servers as SaaS. In addition to this, once this malware is planted and
induced within the server, it cloud begins to operate with the same. Therefore, after this
injection of malware, it becomes easier for the attacker to eavesdrop, steal and
manipulate the information stored within the cloud computing system (Boeckl and et. al.,
2019). Social Engineering and Phishing Attacks:Cloud Computing has been a widespread
technology currently which is adopted all over the world. Hence, such widespread
engagement of the system makes it quite vulnerable to attacks, especially towards the
ones which are related to social engineering. Similar to high jacking, it is also linked
with acquisition of various login credentials which are then used by the attackers to
appropriately and effectively access the information on the server from anywhere in the
world. However, this attack is mostly seen in corporate offices where crucial client
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]