Firewalls
A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
An Internet firewall examines all traffic route dbetween your network and the Internet to see if it meets a certain criteria.
If it does, it is routed between the networks, otherwise it is stopped.
Firewalls can filter packets based on their source, destination addresses and port numbers.
This is known as address filtering.
Firewalls can alsofilter specific types of network traffic.This is also known as protocol filtering because the decision to forward or reject traffic is dependant upon the protocol used.e.g.,HTTP,Telnet or FTP.
Firewalls can also filter traffic by packet attribute or state.
Different types of firewall
- Packet filters
- Circuit-level gateways
- Application-level gateways
- Stateful multi-layer inspection firewalls
Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP.
They are usually part of a router firewall. A router is a device that receives packets from one network and forwards them to another.
In a packet filtering firewall, each packet is compared to a set of criteria before it is forwarded.
Circuit level gateways work at the session layerof the OSI kmodel, or the TCP layer of TCP/IP .They monityor TCP handshaking betweeen packets to determine whether a requested session is legitimate
Application level gateways, also called proxies, are similar to circuit level gateways except that they are ap-plication-specific.They can filter packets athe application layer of teh OSI kodel\
Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls.
They filter packets at the network layer, determine whether session packets are legitimate and evaluate packets at the application layer.
What a firewall protects you from:
- Remote login =>
- When someone is able to connect to your computerand control it in some form
- This can mean that the hacker can view or access your files
- Application backdoors =>
- Some programs have special features that allow for remote access
- Others contains bugs that provide a backdoor, or hidden access, that provides some level of control of the program
- SMTP session hijacking =>
- By gaining access to a list fo e-mail addresses,a person can send unsolicited junk email to thousands of users
- Operating System bugs =>
- Like applications, some operatuing sytems have bavckdoors
- Others provide remote access with insufficient security controls or have bugs that can experienced hacker can take advantage of.
- Denial of Service =>
- By inundating a server with this unanswerable session requests, a hacker causes the server to slow toa crawl or eventually crash
- Macros =>
- To simplify complicated procedures, many applications allow you top create a svc5ipt of commands that the appliaction can run
- This script is known as a macro
- Hackers have taken advantage if this to create their own macros that, depending on the application, can destroy ypur data or crash your computer
- Viruses =>
- A virus is a small program that can copy itself to other computers
- This way it can spread quickly from one system to the next
- Spam =>
- Quite often it contains links to websites
- Be careful of clicking on this because you may accidentally accept a cpokie that provides a backdoor ypour computer
Types of Firewall Architectures
Single-Box Architecture
Screening Router Architecture
Screened host architecture
The bastion host is the only system on the internal network that hosts on the Internet can open connections to. Any external network will have to connect to the bastion host in order to connect to the internal network.
Screened subnet architecture:
The second router or interior router is connected to the internal network and peripheral router. This router is also known as the choke router. Most of the packet filtering for the firewall.It also allows data to travel from the internal network to the Internet. Some of the services that are allowed to go outbound include "outgoing HTTP,telnet,FTP, and others".
The bastion host lies on the perimeter, isolated between the exterior and interior routers. To break into the internal with this type of architectre, an attacker would have to get past both routers. Even if the attacker somehow broke in to the bastion host, he would still have to guess past the interior router. There is no single vulnerable point that will compromise the internal network.
Comments
Post a Comment