Write review for the article - different types of firewalls

Assignment Help Computer Engineering
Reference no: EM132182414

Write review for the article with 2 APA format references.

Firewall Placement Best Practices A firewall is a device that controls network traffic by preventing unauthorized network activity from entering or leaving a particular segment of the network (Kim & Solomon, 2014, p. 348). Firewalls continue to be an evolutionary process in an attempt to match the threats encountered by networks of all sizes.

The first firewalls were very basic and performed packet inspection to determine if and where traffic should be sent (Kim & Solomon, 2014, p. 349). Moreover, these types of firewalls had no memory about any prior packets processed on the network (Ferrell, 2017). Stateful packet inspection introduced the concept of memory and could recall information about a particular network communication (Ferrell, 2017). Processing demands were lessened since it only had to check the rules against a new communication session being established. Jumping ahead slightly are devices that are considered Next-gen firewalls. These are firewalls that include packet filtering and stateful inspection, but also perform deep packet inspection, which looks at the payload of the packet (Ferrell, 2017).

What do the various types of firewalls have to do with the question of firewall placement? The answer is everything. One must first consider what needs protecting? Most home and small business networks will likely implement a basic border firewall configuration that is placed behind the router and makes decisions about what WAN traffic can be sent across the firewall to the LAN (Kim & Solomon, 2014, p. 350).

It will also direct traffic from the LAN to the WAN. In most cases, a border firewall will use packet filtering or stateful inspection to defend the network (Kim & Solomon, 2014, p. 351). However, this configuration does not work well in situations where the organization is hosting public services (Kim & Solomon, 2014, p. 351). A screened subnet firewall, which is the most common approach, works best when hosting publicly accessible resources such as a web server (Kim & Solomon, 2014, p. 351).

In this configuration, a DMZ is segmented so users from the Internet can have limited access to specific resources within the DMZ (Kim & Solomon, 2014, p. 351). Direct access from the Internet into the LAN is not considered secure and is not allowed. A third approach is the incorporation of a multilayered firewall where the entire network is segmented in distinct parts. One firewall will act as a border firewall but will include additional firewalls for each segment of the network (Kim & Solomon, 2014, p. 351).

This type of configuration is used in areas where information must be kept secure, not only from the outside world but also separated from other areas within the organization. Additional firewalls will likely increase security if configured correctly. However, the administration of several firewalls creates additional complexity and can cause unintended results. Rules being implemented on several firewalls might wind up blocking legitimate traffic. User complaints will easily detect this situation. However, a far more serious issue is the situation where access was thought to be blocked and it is not.

This will likely go unnoticed since it will not spawn user complaints and creates vulnerabilities. So, what is the best firewall placement and type? The answer is likely to be "it depends." One must consider, what information needs protecting, what resources need to be accessible and which do not, and finally what is the budget?

This guides the firewall configuration and the complexity of management. I have found that listening to fellow Christians broadens my understanding of scripture. In these conversations, I often hear new and enlightening perspectives to the living Word of God. The Book of Proverbs states, "Iron sharpens iron, and one man sharpens another" (Proverbs 27:17 English Standard Version).

We often get to the resolution of a problem faster by reading and listening to multiple sources of data or information that has integrity. This can also be applied to our understanding of scripture when it is soundly based and legitimate. Therefore, one believer can sharpen the faith and knowledge of another.

References Ferrell, A. G. (2017, December). The five different types of firewalls.

Kim, D., & Solomon, M. (2014). Fundamentals of information systems security (2nd ed.). Burlington, MA: Jones & Bartlett Learning.

Verified Expert

The paper is related to the peer post answering. This paper also highlights the requirement of the new policies and procedures of the security measures. This paper has been prepared in Microsoft Word Document.

Reference no: EM132182414

Questions Cloud

United states supreme court justice : What makes a good candidate for the United States Supreme Court Justice?
What is the role of collaboration in new public service : What is the role of collaboration in New Public Service? What are the implications of collaboration in public administration?
Possible public concerns over loss of national sovereignty : Construct an argument for joining such a treaty, detailing the benefits that international treaties may offer their members and which also addresses
Analyze the buying process for an online product : Every product or service has a buying process, even digital products and services. In this assignment, you will research and analyze the buying process.
Write review for the article - different types of firewalls : Write review for the article with 2 APA format references - The five different types of firewalls.
What is the test statistic : When testing the hypothesis that there is at least a 20% difference in the proportion of users who like the two systems, what is the test statistic
Define how value is added and the related costs : Select a brand and describe the marketing channel the brand will pass through on its way to the end user. Describe how value is added and their related costs.
What are the pros and cons of value added taxes : Imagine that you recently traveled to another country and noticed that the prices on products were the same prices you paid at checkout.
What the forward price and initial value of forward contract : A stock is expected to pay a dividend of $1 per share in two months and in five months. What are the forward price and the initial value of the forward contract

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design a class box that defines a box on a floor

You will Design a class box that defines a box on a floor. A box has a number and an (a,b) location where a and b are numbers between -5, and 5. The key member function is plot, which plots the box.

  Compute the percentage of loss in revenue

Assume that the market window for the newly (back then) related windows 0.5 is are year, and then delay of the entry in the year.

  Context free language

Let L1 be the regular language and L2 be the context-free language, both described over the same alphabet Σ. a) Is L1∩L2 always regular? Explain your claim.

  Create alternative matrix that compares three package system

Create an alternative matrix that compares three packaged systems (e.g., Quicken, Microsoft Money, Quick Books). Which alternative appears to be the best choice?

  Write down a program that includes a function picnic()

The passed floating-point number represents TOTAL amount of money to be spent on food. The function is to determine the quantity of HOTDOGS, HAMBURGERS,SALAD,PICKLES that can be purchaced, writing these values directly into the respective variable..

  How to fit a image in the main frame

how to fit a image in the main frame of uploaded file?

  Explain why is a flowchart useful in developing and

q1. why is a flowchart useful in developing and documenting software? why is the interactive visual logic flowchart

  In what two ways can arrays in php be created

In what two ways can arrays in PHP be created? What keys are used when an array is created but no keys are specified?

  Choose a vertex according to its alphabetical order

Show intermediate results similar to the textbook example. In cases when several candidate vertices have the same minimal costs, choose a vertex according to its alphabetical order.

  Define the term retentive

What does the jump and label instruction do? Give one reason why you might use a temporary end instruction.

  What steps must you take to achieve this goal

Two hundred workstations and four servers on a single LAN are connected by a number of switches.

  What are the boundary conditions for this system

E19: Numerical Methods for Engineering Applications Spring 2016 - HOMEWORK 12. Based upon the code, what are the boundary conditions for this system? What temperature are we assuming (either implicitly or explicitly) lies along the border of the pl..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd