Information Security Resources

Entries for the ‘Firewall’ Category

Network Security: Firewalls

What is the purpose of a Firewall? Firewalls are absolutely vital for keeping network security in force. The firewall stops and controls the traffic that comes between your network and the different sites you go to. A firewall is a constituent of a company’s network protection, and it acts to keep in force the network […]

Leave a Comment

Why Firewall Security Is Necessary To Protect Your Network

In your car, the firewall sits between the engine compartment and the front seat and is built to keep you from being burned by the heat of the combustion process. Your computer has a firewall, too, for much the same reason – to keep you and your data from being burned by hackers and thieves […]

Leave a Comment

Firewall: The Realization of a Company’s Internet and Network Access Policy

The original definition of a firewall is: “a partition made of fireproof material to prevent the spread of a fire from one part of a building or ship to another or to isolate an engine compartment, as on a plane, automobile, etc.” 1 Today, in the computer world, the term refers to any piece of […]

Leave a Comment

Are Two Firewalls Better than One?

Screened Subnet Architecture andFirewalls A firewall’s function is to act as a gatekeeper, keeping Internet “bad guys” out of your internal network. Setting up an effective firewall requires careful planning. In my view, the Screened Subnet Architecture is a preferred network setup for firewalls to protect your company’s network while at the same time allowing […]

Leave a Comment

Firewall Protections: But do you know the Limitations of Firewalls in the first place?

Before you understand the many Firewall Protections, you should know firewall’s limitations first. Here they are: not guarantee data integrity not support authenticity of the source of data no control over how the packets were created not support confidentiality- no encryption among different firewalls unless it is incorporated with VPN features don’t protect against some […]

Leave a Comment

Screened Subnet Architecture – The most common setup of Firewall architecture

Screened Subnet Architecture refers to setup a firewall (or two firewalls) in a way that there is a separate subnet dedicated for network di-militarized zone (DMZ). The traffic comes from external Internet can only get to the DMZ whereas internal users can access the DMZ only before their traffic going to reach Internet. Bastion Hosts […]

Comments (1)

Firewall cannot deal with internal network attack

Firewall is a perimeter security device. A perimeter security device is only good at protecting the internal network from external attack. That means if an intrusion originates from internal network, then firewall cannot deal with it. Statistics shows that most of the network attacks of an organization comes from internal employee and hence most likely […]

Comments (3)

Firewall – the device implementing your Internet Access Policy

Firewall cannot operate properly without careful configuration. It is actually a device that help realize your company (or home)’s Internet Access Policy. Who decides the Internet Access Policy? The information owner! Many people mistaken this to be done by the company’s system administrator. It is wrong. The administrator’s role is to help implementing the firewall […]

Leave a Comment