• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko Chapter 6 – Firewalls

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 3b - Firewalls and IDS and IPS Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 11:31 am

    A firewall is a network security system that monitors and controls incoming and outgoing network traffic according to defined security rules. They act as a barrier between trusted internal networks and untrusted external networks such as the internet. Firewalls can be implemented in both hardware and software forms, and can be divided into different types based on their operational principles and deployment locations.
    Firewall Types: This section describes different types of firewalls, including packet filtering firewalls, status detection firewalls, application layer gateways, and proxy servers. Packet filtering The firewall checks the headers of network packets and determines whether to allow or deny these packets according to predefined rules. The firewall tracks the state of the network connection and makes decisions based on the context of the connection. Application-level gateways and proxy servers provide more granular control by interacting directly with applications.
    Firewall deployment: This chapter also describes different deployment scenarios for firewalls, including peripheral firewalls, masked subnets, and multi-homing firewalls. A perimeter firewall sits at the network boundary and protects internal resources from external threats. Filtering subnets introduces an additional layer of security by isolating the firewall from the internal network. Multi-host firewalls connect to multiple external networks for a more flexible and secure network topology.
    Firewall Rules and Policies: This chapter emphasizes the importance of clearly defined and concise firewall rules and policies. It explains how to create effective rules that balance security and availability, and provides guidance on how to avoid common pitfalls, such as overly loose rules or complex rule sets that are difficult to manage.
    Limitations of firewalls: Although firewalls are a key component of network security, they also have their limitations. This chapter discusses some of the challenges and limitations of firewalls, such as their inability to protect against insider threats, their reliance on accurate and up-to-date rule sets, and their potential to introduce performance bottlenecks.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 6:16 pm

    Firewalls are crucial components in network security, acting as a barrier between trusted and untrusted networks. They monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewalls can be hardware-based, software-based, or a combination of both, and they are essential for protecting networked systems from unauthorized access, cyber attacks, and other security threats. There are several types of firewalls, each serving different purposes and operating at different layers of the network:
    1、Packet Filtering Firewalls are the most basic type, which inspects packets (small chunks of data) at the network layer. 2、Stateful Inspection Firewalls are more advanced than packet filters. These firewalls keep track of the state of active connections and make decisions based on the context of the traffic, not just the individual packets. 3、Proxy Firewalls (Application-Level Gateways) operate at the application layer to filter incoming traffic to certain protocols like HTTP and FTP. They act as an intermediary between end-users and the web, providing detailed, protocol-specific checks.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in