Write review for the article - different types of firewalls

Assignment Help Computer Engineering
Reference no: EM132182414

Write review for the article with 2 APA format references.

Firewall Placement Best Practices A firewall is a device that controls network traffic by preventing unauthorized network activity from entering or leaving a particular segment of the network (Kim & Solomon, 2014, p. 348). Firewalls continue to be an evolutionary process in an attempt to match the threats encountered by networks of all sizes.

The first firewalls were very basic and performed packet inspection to determine if and where traffic should be sent (Kim & Solomon, 2014, p. 349). Moreover, these types of firewalls had no memory about any prior packets processed on the network (Ferrell, 2017). Stateful packet inspection introduced the concept of memory and could recall information about a particular network communication (Ferrell, 2017). Processing demands were lessened since it only had to check the rules against a new communication session being established. Jumping ahead slightly are devices that are considered Next-gen firewalls. These are firewalls that include packet filtering and stateful inspection, but also perform deep packet inspection, which looks at the payload of the packet (Ferrell, 2017).

What do the various types of firewalls have to do with the question of firewall placement? The answer is everything. One must first consider what needs protecting? Most home and small business networks will likely implement a basic border firewall configuration that is placed behind the router and makes decisions about what WAN traffic can be sent across the firewall to the LAN (Kim & Solomon, 2014, p. 350).

It will also direct traffic from the LAN to the WAN. In most cases, a border firewall will use packet filtering or stateful inspection to defend the network (Kim & Solomon, 2014, p. 351). However, this configuration does not work well in situations where the organization is hosting public services (Kim & Solomon, 2014, p. 351). A screened subnet firewall, which is the most common approach, works best when hosting publicly accessible resources such as a web server (Kim & Solomon, 2014, p. 351).

In this configuration, a DMZ is segmented so users from the Internet can have limited access to specific resources within the DMZ (Kim & Solomon, 2014, p. 351). Direct access from the Internet into the LAN is not considered secure and is not allowed. A third approach is the incorporation of a multilayered firewall where the entire network is segmented in distinct parts. One firewall will act as a border firewall but will include additional firewalls for each segment of the network (Kim & Solomon, 2014, p. 351).

This type of configuration is used in areas where information must be kept secure, not only from the outside world but also separated from other areas within the organization. Additional firewalls will likely increase security if configured correctly. However, the administration of several firewalls creates additional complexity and can cause unintended results. Rules being implemented on several firewalls might wind up blocking legitimate traffic. User complaints will easily detect this situation. However, a far more serious issue is the situation where access was thought to be blocked and it is not.

This will likely go unnoticed since it will not spawn user complaints and creates vulnerabilities. So, what is the best firewall placement and type? The answer is likely to be "it depends." One must consider, what information needs protecting, what resources need to be accessible and which do not, and finally what is the budget?

This guides the firewall configuration and the complexity of management. I have found that listening to fellow Christians broadens my understanding of scripture. In these conversations, I often hear new and enlightening perspectives to the living Word of God. The Book of Proverbs states, "Iron sharpens iron, and one man sharpens another" (Proverbs 27:17 English Standard Version).

We often get to the resolution of a problem faster by reading and listening to multiple sources of data or information that has integrity. This can also be applied to our understanding of scripture when it is soundly based and legitimate. Therefore, one believer can sharpen the faith and knowledge of another.

References Ferrell, A. G. (2017, December). The five different types of firewalls.

Kim, D., & Solomon, M. (2014). Fundamentals of information systems security (2nd ed.). Burlington, MA: Jones & Bartlett Learning.

Verified Expert

The paper is related to the peer post answering. This paper also highlights the requirement of the new policies and procedures of the security measures. This paper has been prepared in Microsoft Word Document.

Reference no: EM132182414

Questions Cloud

United states supreme court justice : What makes a good candidate for the United States Supreme Court Justice?
What is the role of collaboration in new public service : What is the role of collaboration in New Public Service? What are the implications of collaboration in public administration?
Possible public concerns over loss of national sovereignty : Construct an argument for joining such a treaty, detailing the benefits that international treaties may offer their members and which also addresses
Analyze the buying process for an online product : Every product or service has a buying process, even digital products and services. In this assignment, you will research and analyze the buying process.
Write review for the article - different types of firewalls : Write review for the article with 2 APA format references - The five different types of firewalls.
What is the test statistic : When testing the hypothesis that there is at least a 20% difference in the proportion of users who like the two systems, what is the test statistic
Define how value is added and the related costs : Select a brand and describe the marketing channel the brand will pass through on its way to the end user. Describe how value is added and their related costs.
What are the pros and cons of value added taxes : Imagine that you recently traveled to another country and noticed that the prices on products were the same prices you paid at checkout.
What the forward price and initial value of forward contract : A stock is expected to pay a dividend of $1 per share in two months and in five months. What are the forward price and the initial value of the forward contract

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a java program that creates an array of integers

Write a java program that creates an array of integers

  How many capacity floppy disks will be required to store

How many 1.0MB. capacity floppy disks will be required to store the data-base? How long will it take to process a database containing 100 x 106 records?

  What is the difference between a station and a node

What is the difference between a station and a node? What are the main characteristics of a circuit switched network? What are its advantages and disadvantages?

  Describe how you can use q to scan s to see

Describe how you can use Q to scan S to see if it contains a certain element x, with the additional constraint that your algorithm must return the elements.

  The functionality to auto-match students to a coach

Allow students to sign up for needing a coach. They also would have a list of courses they need coaching in and a list of available times.

  How many valid hosts can each customer actually allocate

What is the new submask in binary notation for each customer?How many valid hosts can each customer actually allocate?

  What are the unique characteristics of applications

What are the unique characteristics of applications using Big Table, and how is it optimized for these applications?

  Write a procedure to implement a soft-fill algorithm

Write a procedure to implement a soft-fill algorithm. Carefully define what the soft-fill algorithm is to accomplish and how colors are to be combined.

  Write a program that animates two cars moving across a frame

Write a program that animates two cars moving across a frame in opposite directions (but at different heights so that they don't collide.)

  Developing ways to support every applications

List some of the ways which we may guarantee that the majority of our target audience may play our applications.

  What is a denial of service attack

What is a Denial of Service Attack? Could you write a program to generate one? What is an ISP? Can you give an example of one?

  A computer programmer has been arraigned for a computer

a computer programmer has been arraigned for a computer crime. she is suspected of having accessed system files on a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd