• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2021 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

February 17, 2021 by Jose Gomez 45 Comments

Filed Under: 06 - Firewalls Tagged With:

Reader Interactions

Comments

  1. Zibai Yang says

    February 18, 2021 at 9:43 am

    What are the efficient ways to avoid firewall policy conflict?

    Log in to Reply
    • Vanessa Marin says

      February 22, 2021 at 11:09 pm

      I found a really good article on securityskeptic.com that points out 5 best practices when implementing firewalls.
      1. Document all firewall rule changes
      2. Install all access rules with minimal access rights
      3. Verify every firewall change against compliance policies and change requests
      4. Remove any unused rules form the firewall rule bases when services are decommissioned.
      5. Perform a complete firewall rule review every 6 months

      Policy specific advice includes to have strong change control policies, maintain your policies compliant with periodic reviews of standards and regulations, Life cycle management of firewall policies include the management of unused rules, decommissioning service,

      Log in to Reply
  2. Wenyao Ma says

    February 18, 2021 at 8:13 pm

    If there are loopholes in the firewall, what is the most effective control?

    Log in to Reply
    • Mei X Wang says

      February 22, 2021 at 5:50 pm

      If there were loopholes in the firewall, there should be compensating controls to catch these vulnerabilities. For example, having an IDS, or even routine monitoring controls(checking the logs routinely), performing vulnerability scans are all compensating ways to mitigate the flawed firewall.

      Log in to Reply
      • Prince Patel says

        February 23, 2021 at 11:37 pm

        Loopholes in the firewalls can be dangerous and attackers are often looking for loopholes to exploit them. Excess in loopholes and not patching these loopholes defeats the purpose of the firewall. Strict controls against these loopholes are therefore critical for successful firewall program for advanced system security.

        Log in to Reply
  3. Xinyi Zheng says

    February 19, 2021 at 4:13 am

    Why do companies put public servers in the DMZ which don’t have firewall protection?

    Log in to Reply
    • Junhan Hao says

      February 22, 2021 at 9:05 pm

      Hi Xinyi,
      DMZ is to solve the problem that the external network cannot access the internal network server after the firewall is installed. On the other hand, through such a DMZ area, the internal network is protected more effectively, because this type of network deployment, compared with the general firewall solution, has one more barrier for the attacker.

      Log in to Reply
    • Anthony Messina says

      February 23, 2021 at 7:07 am

      Public servers are put in the DMZ because they have to be accessed by the public, such as web servers. The DMZ is generally separated from the private network by a firewall. Because public servers are attacked often, such as web servers, this helps protect the internal network. It can also help mitigate an attacker from pivoting to an internal server with more important data.

      Log in to Reply
  4. Mei X Wang says

    February 19, 2021 at 8:11 am

    What are some things organizations can do to make firewalls less susceptible to DDoS attacks?

    Log in to Reply
    • Xinyi Zheng says

      February 21, 2021 at 8:21 am

      Hello, Mei. I think the organization can use a web application firewall, and also can protect website and any real traffic that it receives. Also, organization should monitoring website traffic, DDoS attacks will occur huge upticks in traffic, so monitor website traffic can track the attack timely. That will help organization to stop some DDoS attacks and build stronger DDoS defenses against.

      Log in to Reply
    • Anthony Messina says

      February 23, 2021 at 7:08 am

      I know that some firewalls address SYN floods by pre-validating the TCP handshake. This is done by creating false opens. Whenever a SYN segment arrives, the firewall itself sends back a SYN/ACK segment, without passing the SYN segment on to the target server. Only when the firewall gets back an ACK, which happens only in legitimate connections, does the firewall send the original SYN segment on to the server for which it was intended.

      Log in to Reply
    • Kyuande Johnson says

      February 27, 2021 at 10:09 pm

      Your servers should be protected by network firewalls and more specialized web application firewalls, and you should probably use load balancers as well. Many hardware vendors now include software protection against DDoS protocol attacks such as SYN flood attacks, for example, by monitoring how many incomplete connections exist and flushing them when the number reaches a configurable threshold value.

      Log in to Reply
  5. Humbert Amiani says

    February 21, 2021 at 12:57 am

    What factors determine when to install a routed firewall versus a transparent firewall?

    Log in to Reply
    • Vanessa Marin says

      February 22, 2021 at 11:15 pm

      It really depends on what your needs are.

      A major benefit of major advantage is of a transparent firewall is that you can insert it into a network without making any IP address changes on other devices. However, your are limited in the number of interfaces you can use.. With a restriction of two interfaces per firewall and using a bridge group you can raise that number to 8 interfaces per firewall.

      Routed mode doesn’t have this limitation. Routed is the usual default mode and is more flexible in that it is easier to set up.

      Log in to Reply
  6. Ting-Yen Huang says

    February 21, 2021 at 3:58 am

    what happened when firewall let a true attack package go through, and is there a kind of firewall that will also detect a true attack package when it is not a provable attack packet

    Log in to Reply
    • Anthony Messina says

      February 23, 2021 at 7:34 am

      Firewalls can’t detect every attack packet. Most firewalls out there are still port based firewalls. That said it is just looking at the SRC, DEST, and PORT headers of the packet. If they match, it goes through. This type of firewall does nothing to prevent any kind of application level attacks. Even if you are using a WAF or a firewall with application filtering, attackers can still send malformed through the firewall hoping to avoid detection. Hopefully there is some kind of IDS behind the firewall that well look into the packet and send an alert to the SIEM if a possible malicious packet does get through,

      Log in to Reply
  7. Anthony Messina says

    February 21, 2021 at 5:29 am

    What distinguishes an application proxy firewall from static packet filtering firewalls and SPI firewalls?

    Log in to Reply
    • Priyanka Ranu says

      February 23, 2021 at 1:05 pm

      An application-proxy firewall is a server program that understands the type of information being transmitted for example, HTTP or FTP. It basically acts as a browser to the server and a server to the browser. It functions at a higher level in the protocol stack than do packet filtering firewalls and hence provides for better monitoring and control of accessibility. Application proxy firewall examines the application message whereas packet filtering and SPI firewalls do not.

      Log in to Reply
  8. Jonathan Castelli says

    February 21, 2021 at 10:22 am

    Why is Network Address Translation (NAT) an important part of securing a network?

    Log in to Reply
    • Anthony Wong says

      February 22, 2021 at 10:45 am

      Hi Jonathan,

      NAT plays an important role in securing a network because it can be used to protect an organization from attackers using sniffers and performing some reconnaissance on the network. NAT will hide the internal IP addresses and port numbers by converting it into a different external IP address and port number before the packet is sent to the destination. In other words, it protects the identity of the internal network from the internet.

      Log in to Reply
  9. Priyanka Ranu says

    February 21, 2021 at 3:02 pm

    What is the different between stateful and stateless firewalls?

    Log in to Reply
    • Zibai Yang says

      February 22, 2021 at 12:25 am

      Hi Priyanka,
      A stateful firewall is a computer or router that can dynamically monitor and filter the traffic passing through it. This structure is called Stateful Packet Inspection (SPI) or dynamic packet filtering. It allows data packets to be inspected more thoroughly, while a stateless firewall can only monitor traffic based on static values. For example, when security is prioritized over speed, use a stateful firewall.

      Log in to Reply
  10. Krish Damany says

    February 21, 2021 at 6:15 pm

    What are some conflict resolution strategies in relation to security policies?

    Log in to Reply
  11. Cami Chen says

    February 21, 2021 at 6:51 pm

    Is this possible to build a new great firewall in the US? Why? How?

    Log in to Reply
    • Krish Damany says

      February 23, 2021 at 6:44 pm

      I don’t believe one great firewall will ever be a viable solution. The internet is an ever-changing landscape and new rules have to be added to keep up with new potential breaches and exploits.

      Log in to Reply
    • Prince Patel says

      February 23, 2021 at 9:57 pm

      The internet, computer security standards, enterprise IT architecture, and regulations are ever changing and evolving. There is no one great firewall solution that can take care of all vulnerabilities and threats. With the evolution of technology and internet, there is never be one true great firewall. Amendments, changes and upgrades will always be needed for the firewall to adapt to newer threats.

      Log in to Reply
  12. Anthony Wong says

    February 21, 2021 at 7:31 pm

    Which OSI layer’s do firewalls work?

    Log in to Reply
    • Zibai Yang says

      February 22, 2021 at 12:33 am

      Hi Anthony,
      In my opinion, the firewall mainly works on the third layer, filtering IP and protocol types, and does not involve the application layer.

      Log in to Reply
      • Anthony Wong says

        February 22, 2021 at 10:48 am

        Hi Zibai,

        Agreed… but leep in mind there are Web Application Firewalls (WAF) that work on the application layer. These firewalls monitor and protect web applications/services from malicious HTTP traffic.

        Log in to Reply
  13. Heather Ergler says

    February 21, 2021 at 10:09 pm

    How could newer AI / ML tools be used to better manage firewall policies?

    Log in to Reply
    • Vanessa Marin says

      February 22, 2021 at 11:22 pm

      Found this great white paper on just this topic! Firewalls are only as good as what is provided by the Network Admin. This article focuses on “intelligent” firewalls that learn from the evolving world of network security using smart detection engine into a firewall. The engine will aim to detect classical IDSs, unusual structures in data packets. If you are interested in reading the article go to the site below and request the full text for free.
      https://dl.acm.org/doi/10.1145/2007052.2007094

      Log in to Reply
  14. Zhen Li says

    February 21, 2021 at 10:32 pm

    What are the effective control to reduce the Firewall vulnerability? Which one is the best one?

    Log in to Reply
    • Xinyi Zheng says

      February 22, 2021 at 2:03 am

      Hi, Zhen! I think there are several ways to reduce the firewall vulnerability. First, the organization should maintaining a firewall’s firmware, which will help to scans and find out the vulnerability in the system. Second, they can back up the firewall’s configuration regularly, it will help to reset the correct configuration when erroer happens, and it can identifying the problem. Besides, the organization should keep the firewall security rules up to date. And every method is important to reduce the firewall vulnerability.

      Log in to Reply
    • Junhan Hao says

      February 23, 2021 at 3:02 am

      Hi Zhen,
      I think they best way to avoid firewall attacks is companies should focus on blocking all inbound and outbound traffic by default, and encourage end users to explain why certain traffic should pass through the firewall. In addition, strictly control who has out-of-band management access to the firewall, and where each administrator is allowed to access management functions

      Log in to Reply
  15. Vanessa Marin says

    February 21, 2021 at 11:17 pm

    What types of internal firewalls would you implement and where would you put them?

    Log in to Reply
  16. Prince Patel says

    February 21, 2021 at 11:30 pm

    Why are firewall policies important?

    Log in to Reply
    • Haozhe Lin says

      February 22, 2021 at 12:55 am

      In the digital business world, enterprises are not safe in the face of network threats. In fact, small and medium-sized enterprises are common targets of cybercrime, and the cost of an attack is usually between $84000 and $148000. If you want to protect customers’ data and avoid revenue and reputation damage, you need to pay attention to the security of it, website space, independent server, or virtual host and website program. A strong firewall is a necessary means.

      First, the firewall runs in the network layer and identifies all incoming requests according to the Internet Protocol (IP) address. IP addresses are unique and assigned by Internet service providers (ISPs). When setting access control with a firewall for the first time, we must decide whether to start with open access or closed access. In the case of open access, all external IP addresses are allowed to send traffic to the network except the IP address that is explicitly blocked. Closed access, on the contrary, blocks all traffic except the IP address marked as allowed. For small businesses, it is obvious that they want to allow open access to public-facing websites so that external visitors can browse them. However, there should be more stringent control over the back-end servers that manage websites and related applications. In most cases, the firewall policy should be set to block access first.

      Secondly, in the early days of the Internet, companies generally stored websites and applications on independent servers. Over time, this trend has transformed into putting resources in shared data centers and into today’s cloud computing movement. For small businesses, hosting data, applications, and services in the cloud often represents a wise financial decision. It needs a lot of energy and maintenance costs to maintain the independent server in an office environment or a small data center. Through cloud computing, you only need to pay for the services you use every month. However, cloud IT resources also have certain risks. This loses physical access to the data and becomes part of the shared network environment. Therefore, cloud customers need to maintain a strict firewall policy. Otherwise, the data may be exposed to hacker attacks. The security of cloud servers is also concerned. Of course, interested friends can learn more about how to improve the security of cloud servers.

      Log in to Reply
    • Zibai Yang says

      February 22, 2021 at 1:04 am

      Hi Prince,
      The security strategy of the firewall is one of the most important features of the firewall. Firewall policies usually consist of thousands of security rules. Each rule generally consists of message traffic source IP, destination IP, source port, destination port, application type, user or user group, VPN instance, valid time period, rule operation, V4 or V6 distinction, log configuration, and other attributes information. Match user traffic according to the rules in the security policy. If the match is successful, the corresponding rule action is executed; if the match fails, the default action is executed.

      Log in to Reply
    • Cami Chen says

      February 23, 2021 at 7:13 pm

      Hi, Prince.
      In my opinion, firewall policies can help companies how to review the firewall. Once the person identifies the vulnerability, he or she can use the policy as a guideline to solve the issue and document it whenever a similar issue occurs again, the person knows how to solve it. In addition, the management can use the policies to evaluate the firewall regularly. After a result of the evaluation is issued, the management can update any new technology in the policies so that the policies will not be out of date.

      Log in to Reply
  17. Junhan Hao says

    February 22, 2021 at 12:09 am

    Why is it that a firewall can keep up with traffic in general but fail to do so during a major attack?

    Log in to Reply
    • Xinyi Zheng says

      February 22, 2021 at 1:42 am

      Hello, Junhan. Generally, firewalls only can filter traffic at wire speed and which is the maximum speed of the lines. When firewall faces the a major attack, the massively increased traffic will make it drop all the packets it cannot process.

      Log in to Reply
  18. Haozhe Lin says

    February 22, 2021 at 12:53 am

    Do you think the new method of subdivision and firewall like DevOps/Cloud will replace our current process?

    Log in to Reply
  19. Austin Mecca says

    February 23, 2021 at 9:18 am

    What is NATs purpose in a firewall?

    Log in to Reply
    • Priyanka Ranu says

      February 23, 2021 at 10:05 am

      NAT is an important part of securing a network as it improves security and decreases the number of IP addresses an organization needs. The router appears as a single machine with a single IP address which masks many computers on the LAN side of the router that may be simultaneously sharing the single IP. NAT routers also functions as very effective hardware firewalls which prevents unexpected or dangerous traffic from the public internet from passing through the router and entering the user’s private LAN network.

      Log in to Reply
  20. Kyuande Johnson says

    February 27, 2021 at 8:51 pm

    What is the difference between a Stateful Firewall and a Stateless Firewall?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in