Before I started writing this, I thought to myself, “Who really needs a firewall?” But, as it turns out, most of us do. If your personal or company computer is connected to the internet, your network is always exposed to threats and risks. This means that you most likely want to protect your device.
When your private information is under threat, a firewall is your first defense system. It is a tool used to filter network traffic between your home or company network and the internet. A computer network firewall performs similar functions to the firewall of a building. In case you do not know, a building firewall is used to prevent the spread of fire by assembling a wall with a fire-resistance duration. Just as the concrete firewall protects one side of the building, computers on the other side will not be affected when something bad happens to one side of it.
Firewalls are an extra barrier of protection on top of other measures, such as anti-malware software. However, software and hardware firewall systems operate in slightly different ways.
Hardware firewall systems filter information from the internet as it passes through into the computer. Hardware firewalls are also independent of the computer they protect. By examining the data flow from the internet to the computer, they can check whether the information is safe. First, the data is examined for information such as source and location through a firewall technique known as packet filtering. A list of permissions is then used to compare the gathered information. This list will determine if the information will be dropped or let through.
Home-use hardware firewalls analyze the data coming into a computer and disregard the data that leaves. Unfortunately, this is a major drawback. Often, malicious software can be disguised as a Trojan horse and be sent through the internet. This may give the illusion that the information came from a trusted source when it is actually damaging software in disguise. In addition, some attacks can lead to your computer becoming a zombie, which will then start broadcasting data. Therefore, because a hardware firewall does not detect outgoing information, rising traffic will not be considered.
These firewalls require little or no setup making them beneficial for small businesses and homes. Furthermore, patching multiple computers into the same router will still protect them. Finally, an advancement in hardware firewalls will give them the ability to analyze more data.
A software firewall must be installed to protect your computer from unauthorized access. Software firewalls have two advantages over hardware firewalls. The first advantage is that software firewalls can monitor outgoing information. This will counter the possibilities of your computer being turned into a zombie and prevent it from being used to broadcast other malware such as viruses and worms.
Software firewalls can be customized-this is the second advantage. This gives you the ability to adjust the permissions if you want to do something that the firewall might not permit. Software firewalls only protect one computer; that is their main disadvantage. A licensed firewall product is required for every computer. On the contrary, a hardware firewall protects any computer that has been attached to it.
The following different types of firewalls exist:
Many firewalls use more than one of these techniques. In systems such as Windows and Mac OS, the computer already has an in-built firewall. In addition, several third-party firewall packages exist, such as Norton personal firewall, Zone Alarm, McAfee personal firewall, Tiny, and Black Ice Protection, among others.
When you go to the clothing store, the salesperson is likely to convince you that there is a size fits all. Being the smart consumer that you are, you know that is not true. Similarly, there is no size of firewall that works well for every organization. The type of firewall you need depends on your management and protection requirements. Firewalls normally fall into one of the following categories:
Having a firewall will protect you from intruders who will try to access your computer remotely. Imagine the shock you will experience when you see your computer mouse is being moved around the monitor by an intruder. If your firewall is configured correctly, it should have the remote access feature disabled to prevent intruders from taking over your device.
In the history of video games, the most significant development “is” online gaming. However, it has potential risks. Many malware targeting online gamers is lurking on the web, hiding in compromised on unsecured game servers. Although game developers keep their server security tight, it is always a good idea to ensure your firewall is enabled before you start playing online games. This will block any attempt by hackers to access your system.
Although it is constantly mentioned that a firewall blocks hackers and different types of malware, its functionality is not limited to that. Apart from protecting your personal files from ransomware, firewall applications have the feature of blocking certain online locations. You can use this feature to block immoral or unsuitable content.
A firewall should not be your only security measure. While a firewall is known to block backdoor access of Trojans, there is a likelihood that this can be bypassed. Therefore, you should always use multiple methods to check the security of your internet connection. In addition, firewalls cannot deal with keyloggers, worms, viruses, and other malware. This is why it is advised to use other anti-malware tools in conjunction with firewalls.
Although it is always advised to keep a firewall as part of a security strategy, it can have the following limitations:
A firewall is a tool used to filter network traffic between the internet and your home or work computer. When the security of your private information is under threat, a firewall is your first line of defense. Hardware firewalls filter information coming into your computer from the internet, while software firewalls filter both the information coming into and/or leaving your computer. Hardware firewall systems are independent of the devices they protect, while software firewall systems must be installed in a computer to protect it. Your management and protection requirements determine the type of firewall you need. A firewall should not be your only security measure- you should use it in conjunction with other security tools.
komar, b., beekelaar, r., & wettern, j. (2003). firewalls for dummies (2nd ed.). new york: wiley publishing.
vacca, j. r., & ellis, s. (2005). firewalls: jumpstart for network and system administrators. chicago, california: elsevier digital press.
klevinsky, t. j., & laliberte, s. (2004). hack i.t.: security through penetration testing (vol. 4th). indianapolis: addison-wesley professional.
riggs, c. (2004). network perimeter security: building defense in-depth. boca raton: crc press.
stewart, m. j. (2014). network security, firewalls and vpn's (2nd ed.). burlington: jones and bartlett learning.