Network Essential Unit-6
Network Essential Unit-6
NETWORK SECURITY
Since the computer virus only hits the programming of the device, it is not
visible. But there are certain indications which can help you analyse that a
device is virus-hit. Given below are such signs which may help you identify
computer viruses:
The first thing which you might notice in case of virus attack is the speed with
which your system shall process. And then gradually other changes can also be
observed.
Further below, we bring to you details as to what anti-virus is and what are its
different types along with a few examples.
WHAT IS AN ANTI-VIRUS?
Typically, most programs will use three different detection devices: specific
detection, which identifies known malware; generic detection, which looks for
known parts or types of malware or patterns that are related by a common
codebase; and heuristic detection, which scans for unknown viruses by
identifying known suspicious file structures. When the program finds a file that
contains a virus, it will usually quarantine it and/or mark it for deletion, making
it inaccessible and removing the risk to your device.
Given below is a list of few of the major antivirus software which is most
commonly used:
• Norton Antivirus
• F-Secure Antivirus
• Kaspersky Antivirus
• AVAST Antivirus
• Comodo Antivirus
• McAfee Antivirus
These are few of the many anti-virus software widely used to remove viruses
from a device.
WHAT IS FIREWALL?
Firewalls are used in enterprise and personal settings. They are a vital
component of network security. Most operating systems have a basic built-in
firewall. However, using a third-party firewall application provides better
protection.
HISTORY OF FIREWALL
Network firewalls have evolved over the years to address several threats in the
security landscape. Firewalls will remain crucial to organizations and society.
So, let’s look at a brief history of firewalls.
• 1989 - Birth of packet filtering firewalls
• 1992 - First commercial firewall DEC SEAL
• 1994 - First of the stateful firewalls appear
• 2004 - IDC coins the term UTM (unified threat management)
• 2009 - Next Generation Firewall (NGFW) was introduced by Gartner
Firewalls are designed with modern security techniques that are used in a wide
range of applications. In the early days of the internet, networks needed to be
built with new security techniques, especially in the client-server model, a
central architecture of modern computing. That's where firewalls have started to
build the security for networks with varying complexities. Firewalls are known
to inspect traffic and mitigate threats to the devices.
FUNCTIONS OF FIREWALL
For example, the image depicted below shows how a firewall allows good
traffic to pass to the user’s private network.
TYPES OF FIREWALLS
• Packet Filtering
A packet filtering firewall controls data flow to and from a network. It allows or
blocks the data transfer based on the packet's source address, the destination
address of the packet, the application protocols to transfer the data, and so on.
• Next-Generation Firewall
According to Gartner, Inc.’s definition, the next-generation firewall is a deep-
packet inspection firewall that adds application-level inspection, intrusion
prevention, and information from outside the firewall to go beyond
port/protocol inspection and blocking.
• Threat-Focused NGFW
These firewalls provide advanced threat detection and mitigation. With network
and endpoint event correlation, they may detect evasive or suspicious behavior.
Now that you have understood the types of firewalls, let us look at the
advantages of using firewalls.
• Firewalls play an important role in the companies for security
management. Below are some of the important advantages of using
firewalls.
• It provides enhanced security and privacy from vulnerable services. It
prevents unauthorized users from accessing a private network that is
connected to the internet.
• Firewalls provide faster response time and can handle more traffic
loads.
• A firewall allows you to easily handle and update the security
protocols from a single authorized device.
• It safeguards your network from phishing attacks.
To keep your network and devices safe, make sure your firewall is set up and
maintained correctly. Here are some tips to help you improve your firewall
security:
• Constantly update your firewalls as soon as possible: Firmware patches
keep your firewall updated against any newly discovered
vulnerabilities.
• Use antivirus protection: In addition to firewalls, you need to use
antivirus software to protect your system from viruses and other
infections.
• Limit accessible ports and host: Limit inbound and outbound
connections to a strict whitelist of trusted IP addresses.
• Have active network: To avoid downtime, have active network
redundancies. Data backups for network hosts and other critical
systems can help you avoid data loss and lost productivity in the case
of a disaster.
Proxy firewalls can protect the application layer by filtering and examining the
payload of a packet to distinguish valid requests from malicious code disguised
as valid requests for data. Proxy firewalls prevent attacks against web servers
from becoming more common at the application layer. Besides, proxy firewalls
give security engineers more control over network traffic with a granular
approach.
On the other hand, application layer filtering by proxy firewalls enables us to
block malware, and recognize the misused amongst various protocols such as
Hypertext Transfer Protocol(HTTP), File Transfer Protocol (FTP), certain
applications, and domain name system(DNS).
NAT and VPN are both basic network translation functions in firewalls.
• Nat (Network Address Translation)
• It hides or translates internal client or server IP addresses that are
usually in a “private address range”. It is defined in RFC 1918 as a
public IP address.
• NAT preserves the limited number of IPv4 addresses and also defends
against network reconnaissance as the IP address from the Internet is
hidden.
• VPN (Virtual Private Network)
• VPN is used to extend a private network across a public network inside
a tunnel that can be often encrypted. However, the contents inside the
packets are protected especially when they are traversing the Internet.
• VPN enables users to safely send and receive data across shared or
public networks.
NEXT GENERATION FIREWALLS (NGFW)
• Insider Attacks
Insider attacks involve activities such as the transmission of sensitive data in
plain text, resource access outside of business hours, sensitive resource access
failure by the user, third-party users' network resource access, etc.
• Malware
Malware threats are usually difficult due to their varied, complex, and
constantly evolving nature. These days, with the rise of IoT, networks are
becoming more complex and dynamic so that sometimes it becomes difficult for
firewalls to defend against malware.
• Patching/Configuration
Patching/Configuration is a firewall with a poor configuration or a missed
update from the vendor that may damage network security. Thus, IT admins
need to be very proactive concerning their maintenance of security components.
The Future of Network Security
In the last few years, virtualization and trends in converged infrastructure
created more east-west traffic and the largest volume of traffic in a data center is
moving from server to server. Some enterprise organizations have migrated
from the traditional three-layer data center architectures to various forms of
leaf-spine architectures in order to with this change. This change in architecture
made some security experts warn that firewalls have an important role to play to
keep the network secure in a risk-free environment. Thus, the importance and
future of firewalls have no end. However, there may be many advanced
alternatives to firewalls in the future.
DIFFERENCE BETWEEN A FIREWALL AND ANTIVIRUS
Firewall
• A firewall is essential software or firmware in network security that is
used to prevent unauthorized access to a network.
• It is used to inspect the incoming and outgoing traffic with the help of
a set of rules to identify and block threats by implementing it in
software or hardware form.
• Firewalls can be used in both personal and enterprise settings, and
many devices come with one built-in, including Mac, Windows, and
Linux computers.
Antivirus
• Antivirus is also an essential component of network security. It is
basically an application or software used to provide security from
malicious software coming from the internet.
• An antivirus working is based upon 3 main actions, Detection,
Identification, and Removal of threats.
• Antivirus can deal with external threats as well as internal threats by
implementing only through software.
LIMITATIONS OF A FIREWALL
• Firewalls are not able to stop the users from accessing the data or
information from malicious websites, making them vulnerable to
internal threats or attacks.
• It is not able to protect against the transfer of virus-infected files or
software if security rules are misconfigured, against non-technical
security risks (social engineering)
• It does not prevent misuse of passwords and attackers with modems
from dialing in to or out of the internal network.
• Already infected systems are not secured by Firewalls.