Firewalls

FIELDS OF STUDY

Information Systems; Privacy; Security

ABSTRACT

A firewall is a program designed to monitor the traffic entering and leaving a computer network or single device and prevent malicious programs or users from entering the protected system. Firewalls may protect a single device, such as a server or personal computer (PC), or even an entire computer network. They also differ in how they filter data. Firewalls are used alongside other computer security measures to protect sensitive data.

PRINCIPAL TERMS

HISTORY OF FIREWALLS

In the early twenty-first century, increasing cybercrime and cyberterrorism made computer security a serious concern for governments, businesses and organizations, and the public. Nearly any computer system connected to the Internet can be accessed by malicious users or infected by harmful programs such as viruses. Both large networks and single PCs face this risk. To prevent such security breaches, organizations and individuals use various security technologies, particularly firewalls. Firewalls are programs or sometimes dedicated devices that monitor the data entering a system and prevent unwanted data from doing so. This protects the computer from both malicious programs and unauthorized access.

The term “firewall” is borrowed from the field of building safety. In that field it refers to a wall specially built to stop the spread of fire within a structure. Computer firewalls fill a similar role, preventing harmful elements from entering the protected area. The idea of computer firewalls originated in the 1980s. At that time, network administrators used routers, devices that transfer data between networks, to separate one network from another. This stopped problems in one network from spreading into others. By the early 1990s, the proliferation of computer viruses and increased risk of hacking made the widespread need for firewalls clear. Some of the advances in that era, such as increased access to the Internet and developments in operating systems, also introduced new vulnerabilities. Early firewalls relied heavily on the use of proxy servers. Proxy servers are servers through which all traffic flows before entering a user's computer or network. In the twenty-first century, firewalls can filter data according to varied criteria and protect a network at multiple points.

TYPES OF FIREWALLS

All firewalls work to prevent unwanted data from entering a computer or network. However, they do so in different ways. Commonly used firewalls can be in various positions relative to the rest of the system. An individual computer may have its own personal firewall, such as Windows Firewall or Macintosh OS X's built-in firewall. Other networked devices, such as servers, may also have personal firewalls. These are known as host-based firewalls because they protect a single host rather than the whole network. They protect computers and other devices not only from malicious programs or users on the Internet but also from viruses and other threats that have already infiltrated the internal network, such as a corporate intranet, to which they belong. Network firewalls, on the other hand, are positioned at the entrance to the internal network. All traffic into or out of that network must filter through them. A network firewall may be a single device, such as a router or dedicated computer, which serves as the entrance point for all data. It then blocks any data that is malicious or otherwise unwanted. Application-level firewalls, which monitor and allow or disallow data transfers from and to applications, may be host based or network based.




Firewalls are one of many protective measures used to prevent hackers from accessing computers or networks.





Firewalls are one of many protective measures used to prevent hackers from accessing computers or networks.

Firewalls also vary based on how they filter data. Packet filters examine incoming data packets individually and determine whether to block or allow each one to proceed. They decide this based on factors such as the origin and destination of the packets. Stateful filters determine whether to admit or block incoming data based on the state of the connection. Firewalls that use stateful filtering can identify whether data packets trying to enter the computer system are part of an ongoing, active connection and determine whether to let them in based on that context. This allows them to examine and filter incoming data more quickly than their stateless counterparts.

FIREWALLS AND COMPUTER SECURITY

By preventing malicious programs or users from accessing systems, firewalls protect sensitive data stored in or transmitted via computers. They are used to protect personally identifying information, such as Social Security numbers, as well as proprietary trade or government information. Both the technology industry and the public have put increased emphasis on such protections in the early twenty-first century, as identity theft, fraud, and other cybercrimes have become major issues. In light of such threats, firewalls play an essential role in the field of computer security. However, experts caution that a firewall should not be the sole security measure used. Rather, firewalls should be used along with other computer security practices. These practices include using secure passwords, regularly updating software to install patches and eliminate vulnerabilities, and avoiding accessing compromised websites or downloading files from suspicious sources.

—Joy Crelin

“How Firewalls Work.” Boston University Information Services and Technology. Boston U, n.d. Web. 28 Feb. 2016.

Ingham, Kenneth, and Stephanie Forrest. A History and Survey of Network Firewalls. Albuquerque: U of New Mexico, 2002. PDF file.

Morreale, Patricia, and Kornel Terplan, eds. The CRC Handbook of Modern Telecommunications. 2nd ed. Boca Raton: CRC, 2009. Print.

Northrup, Tony. “Firewalls.” TechNet. Microsoft, n.d. Web. 28 Feb. 2016.

Stallings, William, and Lawrie Brown. Computer Security: Principles and Practice. 3rd ed. Boston: Pearson, 2015. Print.

Vacca, John, ed. Network and System Security. 2nd ed. Waltham: Elsevier, 2014. Print.