Firewall
Firewall
Firewall
Prepared by :
Zhilwan rahim
Ahmad Ismael
Supervisor by :
Mr .Karwan Mustafa Karem
2023 -[1]2024
Table of Contents
Introduction to Firewall .........................................................................................3
4. Stops Spyware.....................................................................................................5
1.Packet-filtering Firewalls.....................................................................................7
References ...............................................................................................................12
[2]
Introduction to Firewall
A firewall is a piece of software or hardware that filters all network traffic between
your computer, home network, or company network and the Internet. It is our
position that everyone who uses the Internet needs some kind of firewall protection.
This chapter tells you what a firewall does and sets down the basic questions that
you should ask as you are evaluating specific firewalls. Not too long ago, only
construction workers and architects asked the question, “Why do we need a
firewall?” Before the term firewall was used for a component of a computer network,
it described a wall that was designed to contain a fire. A brick and mortar firewall is
designed to contain a fire in one part of a building and thus prevent it from spreading
to another part of the building. Any fire that may erupt inside a building stops at the
firewall and won’t spread to other parts of the building. A firewall in a computer
network performs a role that is very similar to that of a firewall in a building. Just as
a firewall made out of concrete protects one part of a building, a firewall in a network
ensures that if something bad happens on one side of the firewall, computers on the
other side won’t be affected. Unlike a building firewall, which protects against a
very specific threat (fire), a network firewall has to protect against many different
kinds of threats. You read about these threats in the papers almost every day: viruses,
worms, denial-of-service (DoS) attacks, hacking, and break-ins. Attacks with names
like SQL Slammer, Code Red, and NIMDA have even appeared on the evening
news. Unless you haven’t read a newspaper or watched the news in the last year, you
surely have heard at least one of these terms. It’s no secret: they are out there, and
they are out to get us.
[3]
How does a firewall work?
Firewalls serve as the first line of defense against external threats, such as hackers
and malware attacks. In particular, firewalls combined with an intrusion prevention
system (IPS) are crucial in preventing malware and certain application layer attacks,
Firewalls first emerged in the early days of the internet when networks needed new
security methods that could handle increasing complexity. They've since become the
foundation of network security in the client-server model -- the central architecture
of modern computing. Overall, firewalls play an important role in preventing cyber
attacks, protecting sensitive data, and maintaining the privacy and security of
computer systems and networks
[4]
Top 5 Firewall Benefits
3. Prevents Hacking
Unfortunately, the trend of businesses moving more toward digital operations invites
thieves and bad actors to do the same. With the rise of data theft and criminals
holding systems hostage, firewalls have become even more important, as they
prevent hackers from gaining unauthorized access to your data, emails, systems, and
more. A firewall can stop a hacker completely or deter them to choose an easier
target.
4. Stops Spyware
In a data-driven world, a much-needed benefit is stopping spyware from gaining
access and getting into your systems. As systems become more complex and robust,
the entry points criminals can use to gain access to your systems also increase. One
[5]
of the most common ways unwanted people gain access is by employing spyware
and malware—programs designed to infiltrate your systems, control your
computers, and steal your data. Firewalls serve as an important blockade against
these malicious programs.
5. Promotes Privacy
An overarching benefit is the promotion of privacy. By proactively working to keep
your data and your customers' data safe, you build an environment of privacy that
your clients can trust. No one likes their data stolen, especially when it is clear that
steps could have been taken to prevent the intrusion. Additionally, upgraded data-
protection systems can be a competitive advantage and a selling point to customers
and clients. The benefit increases the more sensitive the data your company deals
with.
Types of Firewall
There are mainly three types of firewalls, such as software firewalls, hardware
firewalls, or both, depending on their structure, type of firewall is :
1. Packet-filtering Firewalls
2. Circuit-level Gateways
3. Application-level Gateways (Proxy Firewalls)
4. Stateful Multi-layer Inspection (SMLI) Firewalls
5. Next-generation Firewalls (NGFW)
6. Threat-focused NGFW
7. Network Address Translation (NAT) Firewalls
8. Cloud Firewalls
9. Unified Threat Management (UTM) Firewalls
[6]
1.Packet-filtering Firewalls
A packet filtering firewall is a network security feature that regulates the flow of
incoming and outgoing network data. Each packet containing user data and control
information is examined and tested by the firewall using a set of pre-defined rules.
If the packet passes the test, the firewall allows it to proceed to its destination. Those
who fail the test are disqualified. Firewalls inspect packets by looking at rule sets,
protocols, ports, and destination addresses.
2.Circuit-level Gateways
A circuit level gateway works at the session layer of the open systems
interconnection (OSI) model. The firewall analyzes transmission control protocol
handshaking between packets to identify legitimate traffic and block unauthorized
access attempts. Only the header information is checked to ensure that the traffic
meets the circuit level gateway rules, while the content of data packets is skipped. It
handles connections between trusted servers and clients with untrusted hosts.
[7]
3.Application-level Gateways (Proxy Firewalls)
A proxy firewall is the most secure form of firewall, which filters messages at the
application layer to protect network resources. A proxy firewall, also known as an
application firewall or a gateway firewall, limits the applications that a network can
support, which increases security levels but can affect functionality and
speed. A proxy server addresses this gap by providing a gateway or intermediary
between computers and servers on the internet to secure data that goes in and out of
a network. It determines which traffic should be allowed and denied and analyzes
incoming traffic to detect signs of a potential cyberattack or malware. A proxy server
firewall caches, filters, logs, and controls requests from devices to keep networks
secure and prevent access to unauthorized parties and cyberattacks.
[8]
4.Stateful Multi-layer Inspection (SMLI) Firewalls
Stateful multilayer inspection (SMLI) firewalls filter packets at the network,
transport, and application layers, comparing them against known trusted packets.
Like NGFW firewalls, SMLI also examine the entire packet and only allow them to
pass if they pass each layer individually. These firewalls examine packets to
determine the state of the communication (thus the name) to ensure all initiated
communication is only taking place with trusted sources.
[9]
6.Threat-focused NGFW
[10]
8.Cloud Firewalls
Cloud firewalls are software-based, cloud deployed network devices, built to stop or
mitigate unwanted access to private networks. As a new technology, they are
designed for modern business needs, and sit within online application
environments.
[11]
References
Intellipaat. “What Is Packet Filtering Firewall?” Intellipaat, 12 Oct.
2023, intellipaat.com/blog/packet-filtering-firewall/#no3.
[12]