Preview

Importance of Firewalls in an Organization

Satisfactory Essays
Open Document
Open Document
499 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Importance of Firewalls in an Organization
Firewalls are an extremely beneficial and necessary security tool that organizations need to implement in their network. There are so many ways that information can be shared over the internet either by an organization 's employee for example just searching on the net or by hackers trying to break into the network. Thus, organizations need to implement a security device such as a firewall to protect them from the world (internet). A firewall is a security device that acts as a barrier between two networks, i.e. an organization and the internet. There are two types of firewalls, either hardware or software. Firewalls are built into routers and you can also get software such as Zone Alarm which is software that acts as a firewall. A firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.
"Firewalls use one or more of three methods to control traffic flowing in and out of the network:
• Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded.
• Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa.
• Stateful inspection - A newer method that doesn 't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a



References: How firewalls Work. Retrieved February 14, 2007, from www.howstuffworks.com. Firewall. Retrieved February 14, 2007, from www.whatis.com.

You May Also Find These Documents Helpful

  • Powerful Essays

    3. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall? Why or why not?…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    3. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall? Why or why not?…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Most firewalls today utilize state-based filtering. This filtering is a mechanism in modern firewall technology that maintains a list of current, active connection states that traverse the firewall (AIU Online, 2012). When an application inside the firewall requests a connection to another application running outside the firewall, a connection state is created. The addresses of the two communicating applications are saved in a table, so that the firewall can allow all traffic between them through until the initial connection is terminated.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Routers these are the same setup as the firewall, by users to config the setting the one thing the company does not want to do is use the default setting for any router. Routers are the essential, but workhorses of modern computer networking yet few users realize they are computers, with their operating systems, software, and vulnerabilities.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Packet switching – Where the transmission between technology breaks the data up into blocks and then into packets. Every packet contains information that will lead it to the destination. Every packet travels independently through the network and given different routes in the network. Once it reaches the network of its destination than the original message is reassembled.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Connection security rules require that network traffic allowed through the firewall use which of the following security mechanism?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall…

    • 440 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    1. A null session is basically a pseudoaccount that has no username or password, but can used to access information on ___.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Author: Karen A. Wager , Frances Wickham Lee , John P. Glaser , Lawton Robert Burns…

    • 809 Words
    • 4 Pages
    Good Essays