Firewall
From a definition standpoint, a firewall is a hardware or software used in a networked environment to block unauthorized access by individuals while permitting authorized communications to and from the user. The firewall is often seen as a filtering wall that stands between the local network and the Internet. It jobs is filter out the traffic that might be harmful to the user device. The firewall monitors the ports that connect your network to the Internet and checks data packets before allowing them to pass through. A firewall can accept a packet, drop it -- erasing it from existence -- or deny it, returning it to the sender (Writer, 2013). It does this by using a technique known as “packet filtering”. What the is does is the packet filter checks the address information from the data packet to determine if the source, from which the packet originated, is allowed. If the address is on the list, the packet is allowed to pass. Otherwise the packet is dropped. Packet filtering also has a list of allowed protocols which can be used with it. Because the firewall can be set to use a list of rules to determine what data would be permitted to pass into or out of a network, the firewall is adequate to prevent outsiders from accessing a secure network. But that doesn’t make the firewall invincible, hackers and others can still breach a firewall with the correct know how (Aaron, 2002). They can accomplish this using a variety of methods of attack which cause the firewall to permit access to an unauthorized user. When this happen, it is called an intrusion. An attack hackers like to use in this intrusion is often a form of spoofing. In Address spoofing, the address information of a machine which is on the allowed list within the packet. Or have the packet appear as if it originated in the network that the firewall is protects, and is on the allowed list. Intrusion Detection System To combat this type of attack, Intrusion Detection and Prevention System (IDPS) are used. IDPS can block connections if it finds the connections is an intrusion attempt (Rowland, 1999). How an intrusion detection system (IDS) work is it …show more content…
The firewall's job is to keep intruders from breaking into the user network. Yet the IDS doesn't keep them out, but it keeps track of attempts to break in. When it comes to how they are different the firewall and IDS are like two sides of a coin. A firewall can block connection, while an Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator while the firewall generally will not. They both can succumb to false positive. These false positives, or warning patterns don't really show an attack but because of a rule that is already in place if something is written ambiguously it may get flag as an intrusion (Writer, 2013). While it is not needed to have both/neither on a system they are consider the first and last line of defense for a computer network and should be use as such to keep the user