Firewalls and Intrusion Detection Systems

Firewalls and Intrusion Detection Systems

Ardeliza Lansang

Technologies for Intrusion Detection

Prompt Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies Research these technologies and determine how they are similar and how they differ Are both needed Explain your answer in a short paper SNHU nd


Technology has enhanced our functional lives by providing us with innovations eg stationary and portable devices It has also developed various modes of communications eg VOiP video conferencing email SMS These advancements have allowed individuals and business the ability to remain connected with one another continuously and globally regardless of time and space

Concurrently the digital or information age has also produced serious network concerns and threats The prevalent problems range from phishing scamming cyberbullying to network services disruption such as DoS or denial of service information or identity theft and information sabotage Cyber or Internet crimes have resulted in diminishing or halting productivity They have also caused victims to suffer physical mental emotional and financial loss

To counter ominous risks various software and hardware products have been manufactured to prevent and combat unauthorized access to the network systems Implementing the necessary security measures can eliminate or decrease the ongoing vulnerability to cyber violations In addition to having a stable security infrastructure it is crucial to raise awareness of any threats among users and to remind them of their responsibilities toward maintaining security or how to work against malicious activities eg secure password keeping software and the OS current safeguarding sensitive information etc


A firewall is a hardware or a software or a combination of both that sits between a LAN and the Internet Acting as a barrier between a trusted and an untrusted network its main function is to filter traffic in a networked environment by blocking unauthorized or harmful activities and permitting authorized communications By monitoring the incoming and outgoing network traffic a firewall is fundamentally the first line of peripheral defense against any intrusions Bradley

A firewall not only enhances the security of a host or a network but also protects and shields the applications services and machines that are attached to the network system By checking data packets it allows nonthreats to pass through Conversely it either drops erases denies or returns threats to the sender Sherman

Types of firewalls
Packet filters Packet filtering is the process of allowing or preventing packets at a network interface by checking destination port number source and destination addresses andor protocols In a software firewall a packet filter program examines the header of each packet based on a specific set of rules and is either passed called ACCEPT or prevented called DROP TechTargetcom
Stateful inspection This firewall technology also referred to known as dynamic packet filtering monitors the state of active connections Based on this information and by analyzing packets down to the application layer it determines which network packets to permit passage through the firewall It monitors and tracks communications packets over a length of time TechTargetcom
Proxys Proxy firewalls in combination with stateful inspection firewall perform deep application inspections eg layer 7 protocols such as HTTP FTP Unlike stateful firewalls which cannot inspect application layer traffic proxys can prevent an HTTPbased attack This process is achieved by making the firewall act as a proxy ie after the client opens a connection to the firewall the firewall opens a separate connection to the server on behalf of the client without the clients knowledge TechTargetcom

Benefits of firewall
Protects against routingbased attacks
Controls access to systems
Ensures privacy

Drawbacks of firewall

* If you are the original writer of this essay and no longer wish to have the essay published on the WetPapers website then please email us at wet papers 1 @ gmail dot com for removal request.

© 2018 WetPapers. All rights reserved. Privacy Policy Terms of Service Disclaimer Copyright