What is a Firewall? 653 Views

A firewall is a software or hardware system designed to prevent unauthorized access to an individual computer or network of computers. They are used mostly as a first line of defense to protect your device or network from online threats such as hackers, viruses, Trojans, and worms.
What is a Firewall?Every time you are connected to the Internet, your computer is exposed to all sorts of dangerous programs and malicious people that want to infiltrate your computer to steal your personal information, send spam emails to your inboxes, or use your computer to launch attacks on other computers.

A good firewall system blocks attackers from trying to infiltrate your system and prevents your data and information from flowing out to the bad guys. Firewalls have a similar function as the drawbridge and the portcullis grate in front of the entrance on a medieval castle – controlling who can go in and out. While a castle has its fortified entrance through which both the defenders and attackers have to pass, a computer – either a standalone machine or computer network –has its firewall at the access point for connecting to the outside world.

Hardware vs. Software Firewalls

A firewall can be implemented using either software or a separate physical device (usually for large networks) or a combination of both.

• Hardware firewalls are built into the routers. They are designed to protect all the devices connected to a network . If you are connecting to the internet through a broadband router, the router’s firewall is already protecting your device.

• Software firewalls are included in Microsoft operating systems such as Windows XP, Vista, 7, 8, and 10 and it is turned on by default. Window’s firewalls generally provide less protective features than those purchased from antivirus vendors. One notable feature missing from Windows has been two-way controls to restrict what travels out from your device as well as what comes in.

• Firewalls made by internet security companies can provide two-way protection and may also block malware and other malicious programs.

Firewalls Examine Data Packets Entering and Leaving the Network

Firewalls essentially work by examining data packets entering and leaving your computer or network. In particular, a firewall looks at the sender/recipient IP addresses and the TCP/UDP port information to see if this agrees with the security rules defined by you or your network administrator. Packets that fail to match the given rules or criteria are either dropped or rejected. This prevents hackers from getting into your device and stealing your personal information such as your passwords and bank account numbers. Filtering packets of data is at the core of how a firewall operates. Modern firewalls can filter traffic based on many packet attributes such as the IP addresses of the source or destination, domain names, key words, applications sending and receiving the data, and specific ports. There have been many changes to the mechanics of how this is done since the theoretical concept of a firewall was publicized in 1988.

Analyzing a Packet’s “State of Mind”

Packet filtering only allows packets to pass through the firewall if they match the established rules. These rules can be either set by default or specifically defined by the computer’s administrator. These filters look at each packet individually, usually by looking at the IP addresses of the sender and recipient and the port number. In addition, they don’t analyze whether or not a packet is part of larger stream of traffic or store information about the “state” of the specific connection. For this reason, they are called “stateless” filters. A stateless firewall requires less memory, and can be faster than the more advanced stateful” filters. However, they are unable to make decisions based on the overall communication between hosts.

“Stateful” firewall filters are able to distinguish between the various types of packets used for different types of connections. They do this by keeping packets long enough to decide on the overall “state” of the communication stream and determine whether or not a packet is the beginning of a new connection, part of an ongoing connection, or not part of any connection. A “stateful” firewall can have the connection state as a criteria in addition to the preceding static rules. Application firewall filters look closer at the specific applications and protocols being used. This background helps the firewall determine if an unwanted message is trying to bypass the firewall by using a different port, manipulating the basic structure of a protocol, or encapsulating data within SSL encryption. In practice, many firewalls use several techniques in concept.

A Firewall Doesn’t Provide Comprehensive Protection

One thing to note is that a firewall only acts as a first line of defense. It doesn’t provide comprehensive protection against all threats such as most viruses, spam messages, and malware. If you want a more comprehensive protection for your device, you should also install the latest antivirus and antimalware programs. Additionally, a VPN is recommended to secure your web browsing and your WiFi internet connection at public WiFi hotspots. A VPN encrypts all your internet traffic, which prevents hackers and snoopers from stealing your private information.
Published : Tue 06 Mar 2018
Updated : Thu 26 Mar 2020

Related Articles | Reviews

10 Gadgets & Tools to Help You Protect Your Identity

Protecting your identity and personal information is critically important in today’s hyper-informational technology age. Thieves, hackers, and con artists are constantly coming up with new, creative, and all too-clever ways to gain access to some of your most personal, distinguishing information. The good news is that there are steps you can take to help protect your identity and your money. Some are the staple measures we’ve always used, but there are also new ones that feed our gadget-hungry desires, and some that use the same technology criminals are relying on in the first place. I’ve outlined Ten best methods for protecting your information online. Using these techniques could ultimately save you from losing a lot more than just your phone or wallet.

10 Ways Your Digital Device Could Be Hacked

Today, we rely on digital devices more than ever before. But unlike in years past, most of these devices, whether they’re E-readers, tablets, laptops, notebooks, iPhones and other smartphones, netbooks, iPods, printers, game consoles, handheld gaming systems or smart TVs, can connect to the Internet. Everywhere you turn, there’s another digital device connected to the mass network we call the Web. Even still, most people using these devices don’t consider safety and security to be a priority. It could be that they assume hackers are only concerned with causing trouble for regular computers, but that couldn’t be further from the truth. In fact, many of these digital devices are far more vulnerable to hacking because users don’t protect them with the necessary security software or take the proper measures to ensure that they are protected.

Add Comment

We will be very pleased to hear your feedback about this article or the service we reviewed.

reload, if the code cannot be seen


HomePage Reviews Articles Coupons Search Register Contact us