0% found this document useful (0 votes)
66 views

Flrewall Type Advantag ES Disadllanta GES

The document summarizes and compares different types of firewalls and their advantages and disadvantages. It discusses packet filtering firewalls, circuit-level gateways, stateful inspection firewalls, application-level gateways, and next-generation firewalls. For each type it provides 1-2 key advantages and 1-2 key disadvantages.

Uploaded by

catalina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Flrewall Type Advantag ES Disadllanta GES

The document summarizes and compares different types of firewalls and their advantages and disadvantages. It discusses packet filtering firewalls, circuit-level gateways, stateful inspection firewalls, application-level gateways, and next-generation firewalls. For each type it provides 1-2 key advantages and 1-2 key disadvantages.

Uploaded by

catalina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

FlREWALL ADVANTAG DISADllANTA

TYPE ES GES
Packet
•Efficient at processing packets •Incapable of filtering at the application layer
filtering
•Enables complex security policies through • Can be difficult to securely configure
firewall
filtering on protocol headers • Lacks features like user authentication. logging
•Vulnerable to spoofing attacks

• Provides privacy for data passing in out of • Protects circuits (network sessions)
Circuit rather than Individual packets
level gateway private network
• More efficient processing traffic than •Requires modification to network protocol stack
application level gateways • Incapable of content filtering
• Relatively Inexpensive

•Capable of blocking types of attacks that •can require high degree of skill to
State full exploit protocol vulnerabilities securely configure
inspection •Does not support authenticated connections
•Can operate with fewer open ports,
firewall
reducing attack surface •Not effective against exploits of stateless
protocols
•Capable of blocking many types of denial
of service attacks •High processing overhead

• Capable of detecting and blocking types of • Complex to configure and maintain


Application attack not visible at the OSI model • High processing overhead
level gateway network or transport • Requires a proxy be set up for every
layers network application In use
• Obscures private network details
• Consolidation of security functions
• Provides traditional firewall functionality makes the NGFW a single point of
Next failure
generation combined with other security functions,
Including Intrusion detection prevention • Requires high front-end Investment of
firewall resources to acquire, configure and
systems (IDS/IPS), advanced threat
deploy these complex systems
Intelligence, malware scanning and others
• Depending on architecture, may be
• Capable of monitoring network protocols
processing Intensive
from the data link layer (layer 2 of the OSI
model) through the application layer • Not all organization will require
a 1 the functionality of
l an NGFW
(Layer 7 of the OSI model)
•Can be more efficient at processing network
traffic than combination of firewall plus IDS/IPS
and malware scanning

https://sites.google.com/a/unicesar.edu.co/fblanco/delitos-informaticos?tmpl=%2Fsystem%2Fapp%2Ftemplates%2Fprint%2F&showPrintDialog=1
https://www.ccit.org.co/wp-content/uploads/informe-tendencias-cibercrimen_compressed-3.pdf
https://www.delitosinformaticos.mx/que-es-un-delito-informatico/ciberdelitos-mas-comunes/ataques-de-denegacion-de-servicio/

You might also like