- Web Services
- Security Acts & Laws
- Hacking
- Cookies
- Firewall
- Network Security
- Wireless Technologies
- VoIP
- Email Protocols
- Mobile Communication Technologies
- Mobile Communication Protocols
- Network Protocols
- Types of Networks
- Network Topologies
- Network Devices
- Transmission Media
- Switching Techniques
- Terminologies
- History of Networking
- Introduction
- Home
Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Communication Technologies - Firewall
There exist multiple approaches to counter or at least reduce security threats. Some of these are −
Authenticating users accessing a service
Providing access to authorized users
Using encrypted passwords for remote log on
Using biometric authorization parameters
Restricting traffic to and from
Firewalls are the first pne of defense against unauthorized access to private networks. They can be used effectively against virus, Trojan or worm attacks.
How Firewalls Work
Dictionary defines firewall as a wall or partition designed to inhibit or prevent spread of fire. In networks, a system designed to protect an intranet from unauthorized access is called firewall. A private network created using World Wide Web software is called an intranet. Firewall may be implemented in both hardware and software.
All traffic to and from the network is routed through the firewall. The firewall examines each message and blocks those that does not meet the pre-defined security criteria.
These are some of the prevalent techniques used by firewalls −
Packet level filtering − Here each packet is examined depending on user-defined rules. It is very effective and transparent to users, but difficult to configure. Also, as IP address is used to identify users, IP spoofing by mapcious parties can prove counterproductive.
Circuit level filtering − Like good old telephone connections, circuit level filtering apppes security mechanisms while connection between two systems is being estabpshed. Once the connection is deemed secure, data transmission can take place for that session.
Apppcation level filtering − Here, security mechanisms are appped to commonly used apppcations pke Telnet, FTP servers, storage servers, etc. This is very effective but slows down performance of the apppcations.
Proxy server − As the name suggests, proxy server is used to interrupt all incoming and outgoing messages and mask the true server address.
A firewall may use a combination of two or more techniques to secure the network, depending on extent of security required.
Advertisements