Essay Writing (Firewall) - IMS657
Essay Writing (Firewall) - IMS657
PREPARED FOR:
PREPARED BY:
MATRIC NO:
2021871146
CLASS:
IM244EKA
ACKNOWLEDGEMENT
I would like to express my gratitude to Prof. Madya Dr. Masitah Binti Ahmad because
she has been guided me to finish this assignment. She always there to help and give advice
to make sure I do it right. I am very thankful to Allah the Almighty because has given me
ideas to write this essay successfully without delay. Not to forget my fellow classmates which
are supportive to give some enlightenment regarding the assignment so that I understand
better.
Finally, I want to thank my parents for their moral support and everyone that has
helped me through the making of this essay. Thank you.
ABSTRACT
The first generation of firewall consisted of antivirus protections developed to stop the
spread of viruses entering PCs in the 1980s. In mid-1990s, the physical firewalls were
developed as the second generation of firewalls to protect networks. Third generation of
firewalls focused on fixing vulnerabilities in applications was created in the early 2000s. The
fourth generation of firewalls is called payload. It was made in 2010 and its purpose is to
resolve evasive and polymorphic attacks. The last recorded generation of firewall was seen
in 2017. These firewalls are now equipped with modern and complex methods which boasts
advanced threat detection and prevention solutions.
Packet-filtering firewalls examine data packets that cross network borders. Every
packet of data must be checked against a set of predefined rules. If the packets comply with
these requirements, the firewall allows traffic to pass. If not, connections are stopped, and
warnings may be generated. Circuit-level firewall monitor traffic whenever remote and local
hosts establish a connection. It closes both device connection if it finds suspicious. Stateful
firewalls receive input and make decisions automatically based on threats. Proxy firewalls
1
filter inbound and outbound traffic, preventing direct access to web servers without being
authenticated through Hypertext Transfer Protocol (HTTP) to determine whether connections
are legitimate or not. The next-generation firewalls are built on other firewall to extend its
functionality that offer more protection and controls over sensitive data.
Packet filtering also be used in the firewall where it filters packets that travel between
the router's interfaces. This router can filter IP packets based on source IP address,
destination IP address, TCP/UDP source port, or destination port. (“What Is a Firewall?
Definition, Key Components, and Best Practices”)
Last component is the application gateways. While the packet filtering is good in
disseminating connections it still has its flaws. Firewalls needs to use additional software to
further enhance the filtering process with proxy services like TELNET and FTP. The proxy
server separates end users from websites they browse.
2
2.2 Management of the Firewall
Firewall management is the process of establishing and maintaining a firewall to
guarantee a secured connection. As a matter of course, a company's network and devices
may be protected by numerous firewalls. Managing these firewalls involves developing rules
and policies, documenting changes, and evaluating compliance logs. It includes monitors
user access to firewall settings. Firewall policies must be implemented and updated on
periodically when necessary. Rules must be examined and reviewed to prevent rule conflicts
or vulnerabilities. Firewall software needs to be updated with latest patches to make sure
new threats is identified and not slip through the system anonymously due to outdated
software. The management involves constantly reviewing rules and configurations, analysing
logs and alarms, and diligently monitoring compliance.
Furthermore, as the Internet of Things (IoT) expands, firewalls will have to adapt to
prevent attacks on the growing network of linked devices. It is no doubt that firewall
management is a challenging task that requires oversight of rules, configurations, and
policies. The complexity of modern network structures can make this procedure hard,
especially for IT organisations that lack proper tools and training. Despite their usefulness,
firewalls are susceptible to vulnerabilities and misconfigurations. Configurations might
become old or outdated over time, leaving the network vulnerable to unauthorised access or
cyberattacks. Besides, modern cyber threats are ever-changing, demanding frequent
updates and optimisations to defend against advanced threats such as stateful and packet-
filtering attacks.
3
3.0 CONCLUSION
In a nutshell, firewalls serve a significant purpose in information systems by acting as
a primary line of defence against cyber threats. They operate as a layer of protection
between a trusted internal network and unreliable external networks, monitoring and
managing incoming and outgoing network traffic based on predefined security rules.
Firewalls help to prevent illicit access to or from private networks, assuring data security,
integrity, and availability.
In addition to its defensive role, firewalls provide visibility into network traffic, allowing
organisations to identify and mitigate potential security issues. They can be set up to log and
report on network activities, which helps detect suspicious behaviour or security incidents.
While firewall is good at preventing known risks and unauthorised access, they may not be
adequate for complex attacks or insider threats. To effectively manage threats, organisations
should use a layered security approach that includes firewalls as well as other security
measures such as intrusion detection systems, endpoint protection, and user education.
4
References
Bally, B. (2021, August 12). The history of the firewall. https://www.aureon.com/services/it-
management/it-services/security/firewall/the-history-of-the-firewall/
Book, V. (2023, November 12). Addressing firewall challenges in today’s cyber landscape |
landscape
Buckbee, M. (2022, June 24). What is a proxy server and how does it work? Varonis.
https://www.varonis.com/blog/what-is-a-proxy-server
Conran, M. (2018b, February 5). The Evolving Security Paradigm, Part 1 – History of
paradigm-part-1-history-firewalls/
Deshpande, C. (2023, August 29). What is firewall: types, how does it work, advantages &
tutorial/what-is-firewall
Dosal, E. (2024, February 27). What is a firewall? The different firewall types & architectures.
compuquip. https://www.compuquip.com/blog/types-firewall-architectures
https://www.titania.com/resources/guides/firewall-management#:~:text=Firewall
%20management%20is%20the%20process,devices%20and%20network%20as
%20standard.
https://fastercapital.com/topics/future-trends-and-innovations-in-firewall-
technology.html#:~:text=One%20of%20the%20major%20future,respond%20to
%20threats%20more%20effectively.
Gold, S. (2011). The future of the firewall. Network Security, 2011(2), 13–15.
https://doi.org/10.1016/s1353-4858(11)70015-0
5
Kanade, V. (2022, March 24). What is a firewall? Definition, key components, and best
practices. Spiceworks.
https://www.spiceworks.com/it-security/network-security/articles/what-is-firewall-
definition-key-components-best-practices/#:~:text=Firewall%20architecture%20is
%20built%20upon,packet%20filtering%2C%20and%20application%20gateways.
https://nordlayer.com/learn/firewall/types-of-firewalls/
Rouse, G. (2023, March 3). What Is a Firewall and Why Is it Important in Cyber Security?
Datto. https://www.datto.com/blog/what-is-a-firewall-and-why-is-it-important-in-cyber-
security
Stouffer, C. (2023b, September 6). What is a firewall? Firewalls explained and why you need
one. https://us.norton.com/blog/privacy/firewall#:~:text=A%20firewall%20acts%20as
%20a,to%20steal%20your%20personal%20information.
Tran, T. V., & Ahn, H. (2017). Challenges of and solution to the control load of stateful
firewall in software defined networks. Computer Standards & Interfaces, 54, 293–
304. https://doi.org/10.1016/j.csi.2017.01.012
https://www.kaspersky.com/resource-center/definitions/firewall
https://www.fortinet.com/resources/cyberglossary/firewall
What’s next for network firewalls? | Fortinet blog. (2023, May 17). Fortinet Blog.
https://www.fortinet.com/blog/industry-trends/network-firewalls-ngfw-predictions
https://www.techtarget.com/searchsecurity/definition/firewall