![]() |
| Add caption |
THIS IS A SAMPLE DIAGRAM OF A FIREWALL. . . ..
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
The term firewall originally referred to a wall intended to confine a fire or potential fire within a building firewall (construction). Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.
Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s:
§ Clifford Stoll's discovery of German spies tampering with his system.
§ Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic to observe an attacker
§ In 1988, an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues.that read, "We are currently under attack from an Internet VIRUS! It has hit Berkeley, UC San Diego, Lawrence Livermore, Stanford, and NASA Ames."
§ The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one.
There are three kinds of generations of firewall
First generation: packet filters
The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls
Second generation: "stateful" filters
From 1989-1990 three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling them circuit level firewalls.
Third generation: application layer
The key benefit of application layer filtering is that it can "understand" certain applications and protocols (such as File Transfer Protocol,DNS, or web browsing), and it can detect if an unwanted protocol is sneaking through on a non-standard port or if a protocol is being abused in any harmful way.
There are different types of firewall
And these are. . .
Ø Network layer and packet filters
Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet filter" originated in the context of BSD operating systems.
Network layer firewalls generally fall into two sub-categories, stateful and stateless.
Stateful firewalls maintain context about active sessions, and use that "state information" to speed packet processing while the Stateless firewalls require less memory, and can be faster for simple filters that require less time to filter than to look up a session.
Ø Application-layer
Application-layer firewalls work on the application level of the TCP/IP stack and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.
On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The additional inspection criteria can add extra latency to the forwarding of packets to their destination.
Ø Proxies
A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets.
Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall “as long as the application proxy remains intact and properly configured”.
Ø Network address translation
Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Originally, the NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Hiding the addresses of protected devices has become an increasingly important defense against network reconnaissance.
Firewalls Advantages and Disadvantages
What are the advantages of Firewall Use?
Disadvantages of use
Firewalls Advantages and Disadvantages
What are the advantages of Firewall Use?
- A feeling of increased security that your PC and contents are being protected.
- Relatively inexpensive or free for personal use.
- New releases are becoming user friendly.
- You can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity.
- Some firewalls but not all can detect viruses, worms, Trojan horses, or data collectors.
- All firewalls can be tested for effectiveness by using products that test for leaks or probe for open ports.
Disadvantages of use
- Firewalls evolve due to cracker's ability to circumvent them increases.
- "Always on" connections created by Cable and DSL connections create major problems for firewalls. This can be compared to leaving you car running with the keys in it and the doors unlocked which a thief may interpret as an invitation to "Please steal me".
- Firewalls cannot protect you from internal sabotage within a network or from allowing other users access to your PC.
- Firewalls cannot edit indecent material like pornography, violence, drugs and bad language. This would require you to adjust your browser security options or purchase special software to monitor your children's Internet activity.
- Firewalls offer weak defense from viruses so antiviral software and an IDS (intrusion detection system) which protects against Trojans and port scans should also complement your firewall in the layering defense.
- Some firewalls claim full firewall capability when it's not the case. Not all firewalls are created equally or offer the same protection so it's up to the user to do their homework.
- Cost varies. There are some great free firewalls available to the PC User but there are also a few highly recommended products, which can only be purchased. The difference may be just the amount of support or features that a User can get from a free product as opposed to a paid one and how much support that user thinks he or she will require.
- A firewall protection is limited once you have an allowable connection open. This is where another program should be in place to catch Trojan horse viruses trying to enter your computer as unassuming normal traffic.
- There have been claims made by IDS (Intrusion Detection System) companies where Trojan's were detected such as the RuX FireCracker v 2.0 which disabled certain Firewalls programs thus leaving the PC vulnerable to malicious actions.

Walang komento:
Mag-post ng isang Komento
What is “Law”?
It is possible to describe law as the body of official rules and regulations,
generally found in constitutions, legislation, judicial opinions,
and the like, that is used to govern a society and to control the behaviour of its members, so Law is a formal mechanism of social control.
Legal systems are particular ways of establishing and maintaining social order.
Defining Ethics
I have been blogging about ethics for some time so it is reasonable to ask what is my perspective on ethics? The term ethics is derived from the Greek word ethikos which itself is derived from the
Greek word ethos, meaning custom or character.
In philosophy, ethical behavior is that which is “good.”
The field of ethics or moral philosophy involves developing, defending, and recommending concepts of right and wrong behavior. These concepts do not change as one’s desires and motivations change. They are not relative to the situation. They are immutable.
In a general sense, ethics (or moral philosophy) addresses fundamental questions such as: How should I live my life? That question leads to others such as: What sort of person should I strive to be? What values are important? What standards or principles should I live by? There are various ways to define “ethics.” The simplest may be to say that ethics deals with “right” and “wrong.” However, it is diffi cult to judge what may be right or wrong in a particular situation without some frame of reference.
Computer technology
There is no doubt that computer technology has had a great impact on society and also brought many technical developments with it. It has brought many changes to the way we live as individual as well as members of societies and organizations. It has had major effects and changes on the economy, health, education, industry, agriculture and many other fields. The ability of computers in gathering, processing, presenting and sending large amount of information has had major changes in the way large organizations as well individuals organize their lives. Computers are at work, in schools and hospitals and many other places. We therefore need to have some basic understanding of how they function and the language associated with them.
For people with not enough technical knowledge on computers, the amount of technical knowledge involved in the field of computer technology is overwhelming. It is also a field that changes fast enough for people to keep pace with. This site has been organized to help you understand, in a simple way, the concepts involved and language used in computer technology.