The information of an organization is a very important key element and the rate of cyber-attacks is growing very fast. To improve the security of private data information technology developed one new approach which is called firewall technology. In last five years, the use of internet and mobile has increased by 50% in turn increasing various security risks and threats also increased such as data
breach, security and privacy issues and DOS attack [1]. The main purpose of this report is to understand the fundamental concept of firewall technology and different types of firewall. A firewall is defined as a security process that contains both hardware’s and software’s that protect organization personal details like login ID and data. It has the ability to reduce unauthorized or unwanted signals from private servers and firewall are designed to protect the user’s computer networks and other peripheral devices [2]. This report is categorized into four parts, for example, an overview of firewall technologies, research methodologies, advantages and disadvantages of the firewall process, and results.
Today, the rate of firewall software is increasing very quickly because it is very simple and easy process to detect any malware or unauthentic signals. Information and communication technology established two technologies to avoid cyber-attack such as firewall and intrusion [3]. Intrusion detection is a new approach in the field of computer science and with the help of this process consumers can identify types of attacks and they can secure their personal information. There are many types of firewall technologies developed which are described below:
It is the most common type of firewall technology and it provides a platform to control and monitor host networks. It is also called as stateless inspection process because it does not keep track of every state of the process [4]. The main drawback of this technology is that it cannot handle multiple requests at a time in a single session. It is observed that numbers of users and organization are purchased stateless packet filtering to reduce security risks. In this technology access control system is provided by third-party sellers and it has the capability to work in an operating system and it can be used for routing process [5].
It is an advanced technology of packet filter and it can track the state and situation of every network. The main drawback of a packet filter firewall is that it cannot provide complete detail about each state by which data can be lost at any stage. The information of state table varies according to the firewall product and it involves the IP address of network, destination, numbers of ports and state signals [6]. There are main three important states use for any TCP network, for example, termination, connection establishment, and usage. This type of firewall technology is used by many organizations to monitor and control the state of every data links. If any consumer uses this process then it will identify that the given packet is a part of the developed connection or not.
It is also called a proxy server and in which the consumer communicate with gateway with the help of TCP application. When any customer provides their identity and private information then this gateway communicate with network hosts [8]. The main purpose of this firewall technology is to provide information about the application and how an application is working on a computer network. It has the ability to identify unexpected signals and unwanted traffic singles transferred by an attacker.
It is a combination of both functions and feature and it is more secure technology which can detect unauthorized servers. It is also called as pocket filtering process which is used to combine the proxy firewall with a circuit gateway. This type of method can be used to control the data portion of any packets and it has the capability to identify traffic signals from computer server [8].
There are many differences between firewall technologies which can be understood from following table:
Figure: the difference between various firewall technologies
(Source: Gupta, Saikia and Sanghi, 2007)
The research method included different types of strategies and process to understand the concept of firewall technology [9]. There are numbers of research methods used in this research report, for example, design, approach, data collection process, and philosophy of the exploration. The main objective of these methods is to gather knowledge about types of firewall technology and search strategies can improve the effectiveness of the research.
In this research mixed research design is used to understand the working of firewall technology. A mixed method is defined as a combination of both qualitative and quantitative data analysis. In qualitative research data or information is composed of various articles and journal papers in order to realize views of writers on the topic of various firewall technologies.
In this research, paper data is collected with the help of survey and from different articles published by authors. This research design provides a platform to collect data or information about firewall security and all these information written by using Microsoft and excel software’s [10]. In which a literature review is produced to realize working of firewall and it involved various secondary resources and all information are completely based on researcher topic. With the help of both this method research was able to explain the advantages and disadvantages of firewall technique.
In this research data is collected with the help of a secondary type of analysis method and in relevant data or information is gathered from different sources, books, websites, and other resources [11]. Therefore, research used this process to describe different types of firewall technologies and their strength and weakness.
In this research, the writer used a sampling process and random data sampling is used to recognize the difference between firewall technologies. The method of non-probability sampling system avoided by the investigator at the time of the research to certify that biases did not outcome in influencing the conclusion of the research.
Security of data is the very important aspect for any organization and firewall is a process to reduce security threats and risk. From this research, it is founded that cyber-attacks and security issues can be reduced by adopting firewall software and antivirus. The researcher explained different types of firewall technologies and working principle of these security systems [12]. It is observed that the packet filtering firewall cannot be used for large computer networks because it is not much stable technology. To reduce the weakness of the packet filtering process a new model was developed by information security which is known as stateful inspiration method.
Conclusion:
Firewall refers as a security process which is used to detect unwanted signals and malware from computer networks. In this modern generation, many customers use a computer and other peripheral devices to communicate with other and they faced many security issues due to lack of security. This report is explained the working mechanism of firewall technology and their limitation. There are various kinds of firewall system available in the market, for example, Packet filtering firewall, Stateful -inspection firewall, Network address translation firewall, Application-based firewall, and Hybrid firewall which are described in this report. Therefore, consumers should adopt a firewall and other security plans like encryption, and cryptography technologies to reduced cyber-attacks and malware attack.
References:
The information of an organization is a very important key element and the rate of cyber-attacks is growing very fast. To improve the security of private data information technology developed one new approach which is called firewall technology. In last five years, the use of internet and mobile has increased by 50% in turn increasing various security risks and threats also increased such as data
breach, security and privacy issues and DOS attack [1]. The main purpose of this report is to understand the fundamental concept of firewall technology and different types of firewall. A firewall is defined as a security process that contains both hardware’s and software’s that protect organization personal details like login ID and data. It has the ability to reduce unauthorized or unwanted signals from private servers and firewall are designed to protect the user’s computer networks and other peripheral devices [2]. This report is categorized into four parts, for example, an overview of firewall technologies, research methodologies, advantages and disadvantages of the firewall process, and results.
Today, the rate of firewall software is increasing very quickly because it is very simple and easy process to detect any malware or unauthentic signals. Information and communication technology established two technologies to avoid cyber-attack such as firewall and intrusion [3]. Intrusion detection is a new approach in the field of computer science and with the help of this process consumers can identify types of attacks and they can secure their personal information. There are many types of firewall technologies developed which are described below:
It is the most common type of firewall technology and it provides a platform to control and monitor host networks. It is also called as stateless inspection process because it does not keep track of every state of the process [4]. The main drawback of this technology is that it cannot handle multiple requests at a time in a single session. It is observed that numbers of users and organization are purchased stateless packet filtering to reduce security risks. In this technology access control system is provided by third-party sellers and it has the capability to work in an operating system and it can be used for routing process [5].
It is an advanced technology of packet filter and it can track the state and situation of every network. The main drawback of a packet filter firewall is that it cannot provide complete detail about each state by which data can be lost at any stage. The information of state table varies according to the firewall product and it involves the IP address of network, destination, numbers of ports and state signals [6]. There are main three important states use for any TCP network, for example, termination, connection establishment, and usage. This type of firewall technology is used by many organizations to monitor and control the state of every data links. If any consumer uses this process then it will identify that the given packet is a part of the developed connection or not.
It is also called a proxy server and in which the consumer communicate with gateway with the help of TCP application. When any customer provides their identity and private information then this gateway communicate with network hosts [8]. The main purpose of this firewall technology is to provide information about the application and how an application is working on a computer network. It has the ability to identify unexpected signals and unwanted traffic singles transferred by an attacker.
It is a combination of both functions and feature and it is more secure technology which can detect unauthorized servers. It is also called as pocket filtering process which is used to combine the proxy firewall with a circuit gateway. This type of method can be used to control the data portion of any packets and it has the capability to identify traffic signals from computer server [8].
There are many differences between firewall technologies which can be understood from following table:
Figure: the difference between various firewall technologies
(Source: Gupta, Saikia and Sanghi, 2007)
The research method included different types of strategies and process to understand the concept of firewall technology [9]. There are numbers of research methods used in this research report, for example, design, approach, data collection process, and philosophy of the exploration. The main objective of these methods is to gather knowledge about types of firewall technology and search strategies can improve the effectiveness of the research.
In this research mixed research design is used to understand the working of firewall technology. A mixed method is defined as a combination of both qualitative and quantitative data analysis. In qualitative research data or information is composed of various articles and journal papers in order to realize views of writers on the topic of various firewall technologies.
In this research, paper data is collected with the help of survey and from different articles published by authors. This research design provides a platform to collect data or information about firewall security and all these information written by using Microsoft and excel software’s [10]. In which a literature review is produced to realize working of firewall and it involved various secondary resources and all information are completely based on researcher topic. With the help of both this method research was able to explain the advantages and disadvantages of firewall technique.
In this research data is collected with the help of a secondary type of analysis method and in relevant data or information is gathered from different sources, books, websites, and other resources [11]. Therefore, research used this process to describe different types of firewall technologies and their strength and weakness.
In this research, the writer used a sampling process and random data sampling is used to recognize the difference between firewall technologies. The method of non-probability sampling system avoided by the investigator at the time of the research to certify that biases did not outcome in influencing the conclusion of the research.
Security of data is the very important aspect for any organization and firewall is a process to reduce security threats and risk. From this research, it is founded that cyber-attacks and security issues can be reduced by adopting firewall software and antivirus. The researcher explained different types of firewall technologies and working principle of these security systems [12]. It is observed that the packet filtering firewall cannot be used for large computer networks because it is not much stable technology. To reduce the weakness of the packet filtering process a new model was developed by information security which is known as stateful inspiration method.
Conclusion:
Firewall refers as a security process which is used to detect unwanted signals and malware from computer networks. In this modern generation, many customers use a computer and other peripheral devices to communicate with other and they faced many security issues due to lack of security. This report is explained the working mechanism of firewall technology and their limitation. There are various kinds of firewall system available in the market, for example, Packet filtering firewall, Stateful -inspection firewall, Network address translation firewall, Application-based firewall, and Hybrid firewall which are described in this report. Therefore, consumers should adopt a firewall and other security plans like encryption, and cryptography technologies to reduced cyber-attacks and malware attack.
References:
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download