Mile2 Cybersecurity Institute

Reply To: OCU C)ISSO A Discussion Lesson 10

#111618
Trae Johnson
Participant

Among all security controls, firewalls stand out in network protection because they protect and filter all incoming and outgoing traffic based on predefined security rules. Their main purpose is to act as a barrier between trusted internal networks and untrusted external networks-for instance, between an internal network and the internet. Firewalls do this by inspecting data packets and making decisions to allow or deny the packets based on policies created by an organization.

Firewalls possess a number of key attributes: enforcing access control by inspecting packet information such as source and destination IP addresses, ports, and protocols; awareness of connection state; the filtering of traffic based on applications; and logging for auditing and incident investigations. Segmentation is another attribute critical to an organization in protecting sensitive areas of the network. This confines the lateral movement of an attacker in case one part of the system is compromised.

There are several types of firewalls. Packet-filtering firewalls are the simplest and check basic information in a packet. Stateful inspection firewalls add greater depth to the security by monitoring active sessions and permit traffic only if it matches a known legitimate connection. Application-level firewalls, also called proxy firewalls, act as intermediaries and inspect data at the application layer. These are useful for filtering web or email traffic. Next-Generation Firewalls provide advanced capabilities including deep packet inspection, intrusion prevention, and identification of applications. According to Cisco, modern firewalls combine traditional filtering with behavioral analysis in order to stop sophisticated attacks before they spread within the network.

Firewalls are one of the first layers of defense in any organization, and understanding them is an important skill for a security officer. They play a direct role in protecting data confidentiality, integrity, and availability, and they allow security officers to enforce policy requirements, respond to attacks, and maintain secure communication both internally and externally. Poor firewall management puts organizations at a significantly higher risk of intrusions, data loss, and service disruption.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.