FIREWAL
L
FIREWALL
• A firewall is a security device
— computer hardware or
software — that can help
protect your network by
filtering traffic and blocking
outsiders from gaining
unauthorized access to the
private data on your https://www.hotspotshield.com/imgs/learn/what-is-a-computer-firewall/pic.jpg
computer.
WHAT DOES A FIREWALL DO?
• A firewall acts as a gatekeeper. It
monitors attempts to gain access to your
operating system and blocks unwanted
traffic or unrecognized sources.
HOW DOES A FIREWALL WORK?
• To start, a firewalled system analyzes
network traffic based on rules. A firewall only
welcomes those incoming connections that it
has been configured to accept. It does this
by allowing or blocking specific data packets
— units of communication you send over
digital networks — based on pre-established
security rules.
TYPES OF FIREWALLS
1. Based on Deployment:
• These firewalls are classified based on how
they are implemented in a network.
• a. Hardware Firewall
• A physical device that filters traffic
before it enters a network.
• Often used in businesses, schools,
and large networks.
• 🔹 Pros:
✔ Provides network-wide protection.
✔ Doesn’t consume computer resources.
• 🔹 Cons:
❌ Expensive and requires technical setup.
❌ Less flexible for individual device control.
b. Software Firewall
• Description:
• A firewall installed on a computer or
device to monitor and control traffic.
• Common in personal computers and
small networks.
• Pros:
✔ More customizable for individual users.
✔ Provides protection for a single device.
• 🔹 Cons:
❌ Uses system resources (RAM, CPU).
❌ Needs to be installed on each device
separately.
c. Cloud-Based Firewall (Firewall as a
Service - FWaaS)
•A cloud-hosted firewall that protects networks
remotely.
•Used by organizations with multiple locations or
remote users.
• Pros:
✔ Scalable and easy to update.
✔ No need for physical installation.
• 🔹 Cons:
❌ Requires internet connectivity to
function.
❌ Monthly or yearly subscription fees.
2. Based on Filtering Mechanism:
• These firewalls differ in how they inspect and
filter network traffic.
• a. Packet-Filtering Firewall
• 🔹 How it Works:
• Checks each packet’s header information
(IP address, port number, protocol).
• Allows or blocks packets based on
predefined rules.
• Pros:
✔ Fast and efficient for basic
security.
• 🔹 Cons:
❌ Doesn’t analyze packet content,
which means malware can
bypass it.
• b. Stateful Inspection Firewall
• 🔹 How it Works:
• Tracks the state of active
connections and allows only
legitimate responses.
• More advanced than packet filtering.
• Pros:
✔ More secure than simple packet-
filtering firewalls.
✔ Prevents hackers from spoofing
connections.
• 🔹 Cons:
❌ Requires more computing power,
which slows down performance.
• c. Proxy Firewall (Application Layer
Firewall)
• 🔹 How it Works:
• Acts as an intermediary between users
and the internet.
• Filters requests at the application level
(e.g., only allowing safe websites).
• 🔹 Pros:
✔ Provides stronger filtering by analyzing
full data packets.
✔ Hides user IP addresses for privacy.
• 🔹 Cons:
❌ Slower than other firewalls because it
processes more data.
❌ Some applications may not work properly.
• d. Next-Generation Firewall
(NGFW)
• 🔹 How it Works:
• Combines multiple security features,
including deep packet inspection
(DPI), intrusion prevention, and
antivirus scanning.
• 🔹 Pros:
✔ Most secure option with advanced
filtering.
✔ Protects against modern threats like
malware, phishing, and hacking.
• 🔹 Cons:
❌ Expensive and requires high-
performance hardware.
❌ Complex to configure and manage.
1. ___ A firewall is a security system that monitors and controls incoming and
outgoing network traffic.
2. ___ Firewalls can only be hardware-based.
3. ___ A packet-filtering firewall inspects the contents of a data packet before
deciding to allow or block it.
4. ___ Firewalls help protect networks from hackers, viruses, and unauthorized
access.
5. ___ A proxy firewall acts as an intermediary between users and the internet.
6. ___ Cloud-based firewalls require no internet connection to function.
7. ___ Stateful inspection firewalls track active connections and only allow
legitimate responses.
8. ___ A firewall can prevent all types of cyberattacks without additional security
measures.
9. ___ Software firewalls are installed on individual devices, while hardware
firewalls protect an entire network.
10.___ Next-Generation Firewalls (NGFW) combine multiple security features like
deep packet inspection and intrusion prevention.