Applied Science / Information Technology Essay

Pros and Cons of Firewalls

Internet devices come with a truckload of information that needs to be guided from interference and theft. From the perspective of the user, data protection involves the timely protection of one's passwords and Internet devices from harm. Yet, there is little a user can do from online distortion of valuable data. This brought about an organized system of security that aims to protect against any would-be harm to data enclosed in either an internet gadget or web platform. The active use of this entails the pros and cons of firewalls.

A firewall is borderline security that protects one's Internet data from unauthorized access (Smith, 2010). It is commonly applied to the interchange between a private network and the Internet. The process for its protection is examining the exchange of data across both platforms. It should be noted that such a relationship interprets network traffic meandering between the private utility and the Internet. Usually, the internal data protection is assigned protocols through which the data of the user can be exchanged. When the process does not adhere to the rules assigned by the firewall, the data interaction would be interpreted as harmful and sometimes, it would ask the user to discard the process or it might do it automatically

From the foregoing, it can be understood that when an Internet user goes online to interact with data, there are various dealings set in place to protect such users from getting inimical properties from external sources. The private network is then safeguarded from outsiders' influence to prevent the stealing of information as the firewall sits between both channels of interaction. Typically, when an operator logs into a site, the firewall proofs the security of the platform and examines whether it is safe for the user.

These have been divided into two parts. One is the software firewall and the other is the hardware firewall. While the hardware firewall is commonly installed with broadband routers, the software kind could be integrated into the computer system like any other software. These types would commonly arrive in the form of antivirus safeguard, data protection security, privacy permission, etc (Cavusoglu et.al, 2009). Depending on the type, the data protection instrument is made to prevent interference from various cyber-attacks.

Types of Internet Attacks

Attacks could come in diverse ways. There are the IP spoofing attacks where the intruder would act as a trusted public network either with an active IP address or through the use of an IP address conversant with the local network, or an illegal external IP address. In addition, there is what is fondly called the Man in the Middle attack which is when a person sits between a user and the person s/he is communicating with, captures the data, or controls what gets to the other user(s).

Another is the DoS attacks that restrict the use of a service by bombarding it with traffics that would inevitably lead the system to shut down. The outsider could also redirect traffic away from the user, thereby preventing the user from using the network. These DoS attacks can be initiated through Internet facilities such as the Transmission Control protocol/internet protocol (TCP) and Internet Control Message Protocol (ICMP) (Scully, 2003). Notwithstanding, a major way to prevent attacks is through a data protection system that is dependent on the knowledge of the pros and cons of firewalls.

Advantages of Firewalls

1. They are bound to detect online viruses that could harm one's computer devices permanently. Some of these are Trojan, malware, worms, to list a few.

2. Usually, firewalls do not reduce the overall performance of the Internet device. The processes might affect the do not affect the Internet speed in the course of its usage.

3. Firewalls, especially in software installations, are easy to input into the computer. They need not any special process.

4. It creates a filter for each individual. From these, every security check is independent of the other. These online security monitors the traffic going to and fro between the private network of the user and the local or public network.

5. Privacy is guaranteed for the user as the security blocks any access that has not been sanctioned prior to the attendance or has been recognized as impeding the private enjoyment by the user.

Disadvantages of Firewalls

1. The cost of obtaining firewalls is high. This is usually in the case of a software firewall. The cost-free ones do little or nothing to prevent high impact malware.

2. Internet connections through a person using a broadband modem are the most common weaknesses of firewalls.

3. These data protection tools can only protect against external attacks leaving internal protection to the user's discretion.

4. Sometimes, in its operation, they might block authorized users from accessing important data. This is because when a user makes a wrong connection or takes an invalid route the absence of malice, it sees such operation as harmful.

5. Although they might detect viruses, these security mechanics cannot safeguard the user from viruses spread through flash drives, floppy discs, hard disks, etc.

6. The operations of firewalls might have a complex approach to it through the high maintenance feature. This becomes a problem in small businesses that usually require a single person to operate it as opposed to large corporations with distinct staff. The operation would tend to be more complex for the latter than the former.

Finally, the use of Internet devices requires some extent of care from the user. A user should take meticulous care of the Internet devices because while a firewall protects internal harmsPros and Cons of Firewalls, it does nothing for external invasion. It follows that users should be wary of whom they share data information within the course of the usage.

Looking for
an ideal essay?

Our expert writers will write your essay for as low as

from $10,99 $13.60

Place your order now

Recent
Essays

Abuse in the world of sports
Aggression in children
Applications of decision theory
How the immune system works and How to strengthen it
Promoting rape culture

Related
Essays

Evaluation of Code Clone Detection Tools
Software Quality Models Overview
Generative Adversarial Networks and Data Augmentation
Memory Consistency
Container-based Computing Vs Virtualization

Need your
Essay done Overnight?

Achieve your academic goals with our essay writing experts!