Network Security

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

8 April 2016

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

75 writers online

A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet. If you use a computer at home the most efficient and important step to help your computer to protect by turning on your firewall. If you have a more than one computer connects in home. It is important to protect every computer. You should have a hardware firewall (such as router) to protect your network, but you should also use software firewall on each computer to prevent the spread of virus your network. If your computer is a part of business, you should follow the policy established by network administrator. How it works:-

When your firewall protection is turned on, everything that goes in and out of the network is monitored. The firewall monitors allows ‘good data’ in and block ‘bad data’ from entering your network. Firewall uses one or combination of the following method to control the traffic in and of the network:- 1) Packet filtering:-

The most basic form of firewall software uses pre-determined rules to create different filters. If an incoming packet of data (small chunk of data) is flagged by the filters, it is not allowed through. Packets that make it through the filters are sent to requesting system and all others are discarded. 2) Proxy services:-

A proxy service is an application that acts as an intermediary between systems. Information from the internet is received by the firewall and sent to the requesting system and vice versa.  Proxy server operates at the application layer of firewall, where both ends of the connection are forced to conduct session through the proxy. They operate by creating and running a process on the firewall that mirrors a service as if it were running on the host end, and thus centralize all the information transfer to the firewall for scanning. 3) Stateful inspection:-

The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being transferred. Types:-

There are two types of firewall that are as follows:-
Hardware firewall.
Software firewall.
1) Hardware firewall:-
Hardware firewall built into the device such as routers and can protect every single machine on a network and require little configuration for efficient work. They mostly use packet filtering technique to examine the header of the packet, determining source and destination, then comparing the data to a set of predefine rules, they decide whether to ignore the packet or forward to the next step or to its final destination. 2) Software firewall:-

Software firewalls are the most popular protection method for home users. They usually come as standalone applications or as a part of complete antivirus protection software. That is why it is mostly used in personal network. Antivirus such as bull guard provides besides providing protection for inbound and outbound traffic. A software firewall also protects against worms and Trojan horses.

The software firewall must be regularly protected to keep up the latest technology updates and provides effective protection. NOTE:-
Each type has advantages and disadvantages, ranging from ease of implementation to high initial cost. Companies should use the firewall as part of overall information security program that includes data integrity, application integrity and data confidentiality and authentication.

Cite this page

Network Security. (8 April 2016). Retrieved from

"Network Security" StudyScroll, 8 April 2016,

StudyScroll. (2016). Network Security [Online]. Available at: [Accessed: 4 June, 2023]

"Network Security" StudyScroll, Apr 8, 2016. Accessed Jun 4, 2023.

"Network Security" StudyScroll, Apr 8, 2016.

"Network Security" StudyScroll, 8-Apr-2016. [Online]. Available: [Accessed: 4-Jun-2023]

StudyScroll. (2016). Network Security. [Online]. Available at: [Accessed: 4-Jun-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.