The global state of the world has made technology to be almost a basic need in the way things are done. The current advancement in technology has led to many innovative ways of doing things (Bheemavarapu et al., 2018). The automation of many machines has really made the human manual labor to be replaced by the programmed machines. This has really questioned the power of the mind of man in doing some of the tasks that the machines can do. The fact that technological advancement is changing the world makes it possible to embrace what comes (Schulze, 2018, June). The move has OI been very instrumental in changing the view of the effectiveness of performance of duties. This is because the machines use automated energy that is controlled by the human effort. The overall impact is that they improved work without fatigue (Kumar et al., 2018).
Purpose of Firewall
This modern advancement has been very instrumental in making the safety of both the operating hardware and software to be sorted (Saadawi, 2018). With this in place, there has been a good way ensuring that the systems are guarded for efficient performance. The interaction between private internet and internet has made it possible to have good control policies that guarantee much security (Dzinkowski, 2018). With the combination of the hardware and the software, the risk of a security breach is made possible because the systems are connected (Yan, Jian-W& Lin, 2015). The two software form a protective wall that makes there to be a divergence between the corporate network and the outside world.
The data security is made in a way that makes organizations to keep its business or corporate information as private and confidential (Cox et al., 2018). The way this is done is by putting a computerized system in place to provide security to all the information that a specific organization has. Recent developments in computer science have made social online platforms to be a tricky sector that needs to be handled with much care (Caceres, 2017). Some of the advancements have been so positive making the field to be simplified in the execution of the duties (Hamlett, 2014). This has made people to embrace the field since it is a digital program that simplifies work and saves people from the manual tasks (Zhao, 2016). On the other hand, the negative impacts have been escalating in considerable frequency.
Cybercrime has been the talk of the day in the international software grounds. Some suppliers of some software’s have been doing some underground work through some frameworks in the programming models that make use of webs that are unacceptably dark (Kumar, 2015). This makes them crop in the programmed systems and perform all the necessary activities required to do cyber-attacks (Christiana & Cooper, 2018). For instance, in May 2015, some software experts made use of “tox”, which is a construction kit that uses ransomware. This was one of the ways that the coordinate spreading of the return of the transactions of the cybercrimes was facilitated (Yan, Jian-W& Lin, 2015). This remains one of the disadvantages of having open software that is subjected to too much greater risks.
The access of the secure software by the cybercriminals has been a challenge in putting trust on the data security (Krit & Haimoud, 2017 May). A lot of crucial information is kept in the security systems in the organization’s software, which demands a guarantee that the information will not be risked to be in the hands of the wrong people (Sharif, & Abdullah, 2018). Cybercrimes are increasing at an alarming rate in the contemporary world hence compromising the trust that people have on software systems in the long-run.
The advancement in technology has made different organizations to adopt different firewalls that are functional in society (Mathur & Nishchal, 2010, October). This has eased the functioning role of many management authorities because their roles are made simpler. They are responsible for ensuring that the information that concerns the company is maintained within the required boundaries (Eykholt & Caceres, 2017). There is a need for good investment in the systems so that the data is secured for the benefit of the organizations. The workers in any organization have a responsibility of embracing the organization’s goals by keeping the information to themselves if need be (Zhao, 2016).
Types of Firewall Technologies
Software Firewalls. Firewalls are of different types based on the function that it performs best. Packet filtering firewall applies a set of rules that make use of the incoming and outgoing IP address which then discards the part after use (Smyth, 2005). Depending on the type of firewall, the system can be made in such a way that allows configuration of the filter packets in many directions. This applies to and from the internal networks. It has the source IP address which makes the IP work. The destination IP dress enables the system to reach all corners of operation. The IP protocol field is responsible for transporting the protocol to the needed destination (Yan, Jian-W& Lin, 2015). The interface of the firewall makes it possible to interconnectivity to happen in the three ports.
This type of firewall is so flexible in the way it is used, because it enables the people working with the system to feel its simplicity in the long run (Naik et al., 2018). This happens because they do not examine the upper layer that employs the data vulnerability. However, one of the limitations of this type of firewall is that it has limited information in the database. This makes it have limited uses mainly in small organizations. It also has a small number of variable information that makes it unfit for configurations in most of the security systems (Sharif, & Abdullah, 2018). The configuration of such systems does not guarantee much reliability in matters of data security.
Circuit-level gateway is another form of firewall used in modern industries as a data security mechanism. It is important to note that the application level in the system enables it to have a stand-alone functional system that improves its efficiency. It does not permit an end to end connection in its use. This makes it unique because it makes use of some system update mechanism that is useful in almost all types of industries (Zhao, 2016). The multipurpose use is one of the convenient characteristics that make it the choice of many organizations that need such systems.
The firewall is able to be used typically, which indicates that the administrator is able to allow it to be to be used by a different user, hence making the user convenient. The client-server applications are made possible through the use of some system protocols that increase the security of the system (Fernandez et al., 2014). The implication of this is the establishment of a connection that is object reachable. This makes it easy for the operating system to have an established way of making information systems to work efficiently (Zhao, 2016). It can either establish the appropriate connection or deny in the long-run.
Application gateway firewall is another device that acts as a relay to the application traffic system by making use of the gateway as a remote host for accessibility (Dhayapule et al., 2018). The user does this by providing a valid authentication by use of proxies that are necessary for information flow (Morgan, 2016). The authority of this function is made possible through the installation of the right proxies that are connected through the two ends. The specific codes are made by the specific applications that make the firewalls to be able to perform the required functions (Sun, 2015). There is a set of support that controls all the activities from the central point hence making the operations to be performed with much ease (Barnes et al., 2009).
A personal firewall is another type that helps in controlling the traffic network between the personal computer and the workstation that one can be having (Peisert et al., 2018). The enterprise network or the internet is maintained on the other side that makes the interconnection possible. Most of these fireworks are less complex and therefore they can be used by people even in their homes because of their portability (Knight, 2005). They have the primary role of denying the unauthorized access to some areas by people who may have malicious plans concerning the access of the systems (Yan, Jian-W& Lin, 2015). They also monitor the outgoing activities to block other malware that may be present in the system (Ingrand & Ghallab, 2017). However, most of the software firewalls discussed above cannot single handedly offer adequate protection, hence the vulnerability of malicious attacks is still significant even with the use of the security mechanisms. Therefore, to offer considerably protection, organization must explore other methods of boosting information system (IS) security to significantly reduce the vulnerability of ISs.
Hardware Firewalls. There exist numerous hardware firewalls, which can boost IS protection from malicious software attacks. Most of the existing hardware firewalls use a similar basic principle to protect internet users from cyber-attacks. A router, which possesses natural firewall-like characteristics, is one of the many hardware firewalls. In a router-computer network, the router assigns a unique address to every computer, while it retains a single IP (Internet Protocol) address to direct traffic. In this regard, targeting a particular computer behind a router, becomes much more difficult than in one-on-one direct connections. Although all routers possess firewall properties, more expensive categories, especially from the same manufacturers as the basic ones, have particular characteristics to attacks from malicious users. Sophisticated hardware firewalls utilize the Stateful Pack Inspection (SPI) technique, which involves screening particular content of traffic in a network to establish any code that can potentially cause harm, while basic routers only bar specific addresses and computer ports. Thus, a combination of sophisticated (to scan the content of a network traffic to identify malicious software) and basic (block the harmful code source IP addresses and computers ports) hardware firewalls can immensely improve IS security in an organization without significantly increasing the cost of computer network implementation.
Like their software counterparts, hardware firewalls cannot in isolation offer, sufficient IS security in modern computer networks. According to Varadhan and Gomes (2015), although routers protect specific computers from attacks, they more easily spread malware across a network if one or more computers connected to them acquires a malware, such as a virus maybe from internet downloads compared to when in separate connections. Easy spread of malware across a network is a huge risk, because a single user can easily compromise the functionality of the entire IS in an organization, hence immensely increasing the cost of recovery and business continuity mechanisms. Therefore, hardware firewalls require information system security reinforcement mechanisms to ensure significant risk mitigation and reduced cost of recovery from attacks.
A Combination of Software and Hardware Firewalls. Both hardware and software firewalls possess inherent drawbacks, hence cannot offer significant IS security in isolation, but their combination can immensely boost information security outcome. Hardware firewalls can immensely increase the cost of operation recovery from malicious attacks, because of their inherent drawback of introducing a significant high level attack vulnerability. However, the SPI capability in hardware firewall is highly essential in detecting specific malware and block their source IP address or computer ports from accessing the network, hence completely reducing the threat of attack. On the other hand, software firewalls mostly offer a universal blockade for a wide range of threat categories without any form of specification. Threats that do not fall in the range of software firewall protection can easily surpass it, hence end-up compromising IS security. Furthermore, too much use of software firewalls can even block non-threating traffic, hence immensely reduce the network effectiveness. In this regard, introducing a level of hardware firewalls to specific threats that surpass the software firewalls, as well as reduce the chances of barring essential traffic, by reducing the number of universal blockades, is essential in modern computer networks that require high level IS security protection and functionality. Nevertheless, although the combination of software hardware firewalls can offer considerable protection, there still exists an avalanche of IS threats, which a released in the modern market at a very high rate (Kaur, Kaur & Gupta, 2016). Therefore, IS security enhancing efforts must always consider additional IS security strategies, such the use of antiviruses on every computer, to considerably mitigate the risks.
Critical Evaluation of Firewalls used in the Industry Today
Generally, the firewalls must incorporate some network systems like the virtual private network that allows the managers of software’s to be in a position to enjoy the attractive solutions (Singletary & Singletary, 2004). The set of computers given allow some form of connectivity that makes it possible for people to access information with the authority of the administrator (Griffin, 2007). This form of connectivity is very useful in the interconnection sites that are useful in the sharing of important information among different parties (Chapman et al., 1995). Distributed firewalls are used in this case (Cohen, 2011). Their configuration involves the use of standalone devices that are able to have other host-based firewalls that are based on the common administrative control (Sharif, & Abdullah, 2018).
Card (2017) argues that there is the configuration of the host resident firewalls by the general administrators who have the custody of the whole software. The servers are controlled from the main workstations that are set to perform the normal daily functions of the organization in question (Yan, Jian-W& Lin, 2015). They are able to provide information that makes the system to prevent any attack from external invasion by having very organized protection (Mell & Grance, 2014).
Firewalls are so necessary for different avenues ranging from government organizations, corporations, and other organizations that have embraced the evolution of technology within the course of time (Hu et al., 2015). They have been embraced due to the different reasons that make it very good as a technological advancement (Dorigo& Stützle, 2019). It makes an avenue for a centralized data processing system, something that is much needed in today’s digital world (Zhao, 2016). Many terminals can be directly be connected to this system hence improving the functionality (Byabagye, 2011).
The internet connection has stopped being an option in organizations. Local area networks have been advanced in many organizations to allow as many departments as possible to access connectivity (Sharif & Abdullah, 2018). This has eased connectivity hence making the use of firewalls to be so instrumental in the implementation of the majority of strategies of the organizations (Sharif, & Abdullah, 2018). Many enterprises are able to access the information they need from each other through the interconnection of their software. However, this needs to be done with much care (Cheswick et al., 2003).
Technology has been embraced in many organisations in form of firewall. In this regard, this paper presents a discussion of the modern day use of firewall for data security. The paper includes the introduction that sheds more light on what firewalls are and their uses. It also includes a vivid explanation on the need to have firewalls in any organization in question. The purpose of the firewalls in firms is put into context explaining the effects on organizations due to lack of firewalls. This was followed by a thorough explanation of the types of firewalls that are used in different organizations as well as the benefits that accrue to an organisation for using the firewall. The paper also highlights issues related to cybercrime and data security and includes a detailed critical evaluation of the use of firewalls in modern day organisations.
All the efforts made by the information technology experts have been for the betterment of the data and the information systems. This is necessary because of the current need to promote data security in industries with a view of making things work with the order. Firewalls have been the major inventions that have cleared the doubt and fear that makes organizations have peace when dealing with their data.
Barnes, M. R., Harland, L., Foord, S. M., Hall, M. D., Dix, I., Thomas, S., … & Brouwer, C. R. (2009). Lowering industry firewalls: pre-competitive informatics initiatives in drug discovery. Nature Reviews Drug Discovery, 8(9), 701.
Bheemavarapu, H., Kadambala, H. K. C., Liesche, S., Medicke, J. A., Padmanabhan, G., Rao, P., … & Veeshagouni, V. (2018). U.S. Patent Application No. 15/462,568.
Byabagye, F. K. (2011). Effective and quality technical support in business to business partnerships with focus on the high-tech (semiconductor industry) products (Doctoral dissertation).
Caceres, A. (2017). U.S. Patent No. 9,661,083. Washington, DC: U.S. Patent and Trademark Office.
Card, S. K. (2017). The psychology of human-computer interaction. CRC Press.
Chapman, D. B., Zwicky, E. D., & Russell, D. (1995). Building internet firewalls. O’Reilly & Associates, Inc..
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc..
Christiana Jr, A. H., & Cooper, H. H. A. (2018). Security 101: An Introduction to the Private Security Industry: Joseph J. Jaksa (2016). Durham, NC: Carolina Academic Press, 266 pages plus index 6 pages, $60.00 soft cover.
Cohen, D. (2011). Will industry influence derail UN summit?. BMJ: British Medical Journal (Online), 343.
Cox, S. P., Derk, D. G., Gibble, K. L., Hochberg, A. H., Smith, J. P., Voyk, S. V., … & Jean, X. Y. (2018). U.S. Patent Application No. 15/473,450.
Dhayapule, R. R., Gupta, R. K., Kumar, S., & Phillips, R. (2018). U.S. Patent No. 9,959,336. Washington, DC: U.S. Patent and Trademark Office.
Dorigo, M., & Stützle, T. (2019). Ant colony optimization: overview and recent advances. In Handbook of metaheuristics(pp. 311-351). Springer, Cham.
Dzinkowski, R. (2018). CYBER CFO: THE NEXT TOP FINANCE JOB?. Strategic Finance, 99(10), 32-37.
Eykholt, J. R., & Caceres, A. (2017). U.S. Patent No. 9,661,083. Washington, DC: U.S. Patent and Trademark Office.
Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2014). Patterns for cloud firewalls. AsianPLoP (pattern languages of programs), Tokyo.
Griffin, J. W. (2007). Academic neurology and industry: open doors or firewalls?.
Griffin, J. W. (2007). Academic neurology and industry: open doors or firewalls?.
Hamlett, K. (2014). Types of firewalls to protect a business network. Chron. Retrieved from
Hu, H., Han, W., Ahn, G. J., & Zhao, Z. (2014, August). FLOWGUARD: building robust firewalls for software-defined networks. In Proceedings of the third workshop on Hot topics in software defined networking (pp. 97-102). ACM.
Ingrand, F., & Ghallab, M. (2017). Deliberation for autonomous robots: A survey. Artificial Intelligence, 247, 10-44.
Kaur, K., Kaur, S., & Gupta, V. (2016, March). Software defined networking based routing firewall. In Computational Techniques in Information and Communication Technologies (ICCTICT), 2016 International Conference on (pp. 267-269). IEEE.
Knight, W. (2005). Firewalls ring changes. Infosecurity Today, 2(2), 18-21.
Krit, S. D., & Haimoud, E. (2017, May). Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically. In Engineering & MIS (ICEMIS), 2017 International Conference on (pp. 1-7). IEEE.
Kumar, A., Dutt, A., Nahar, S., Batshas, S., Majumdar, C., Saraiya, R., … & Chatterjee, C. (2018, November). It’s Raining Barrels: Cloud Computing in the O&G Industry. In SPE Middle East Artificial Lift Conference and Exhibition. Society of Petroleum Engineers.
Kumar, S. N. (2015). Review on network security and cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1-11.
Mathur, P., & Nishchal, N. (2010, October). Cloud computing: New challenge to the entire computer industry. In Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on (pp. 223-228). IEEE.
Mell, P., & Grance, T. (2014). Nist cloud computing forensic science challenges. Draft Nistir, 8006.
Morgan, S. (2016). One million cybersecurity job openings in 2016. Forbes, January, 2.
Naik, N., Jenkins, P., Kerby, B., Sloane, J., & Yang, L. (2018, July). Fuzzy logic aided intelligent threat detection in cisco adaptive security appliance 5500 series firewalls. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1-8). IEEE.
Peisert, S., Dart, E., Barnett, W., Balas, E., Cuff, J., Grossman, R. L., … & Tierney, B. (2017). The medical science DMZ: a network design pattern for data-intensive medical science. Journal of the American Medical Informatics Association, 25(3), 267-274.
Saadawi, H. (2018, April). The Legacy of Piper Alpha 30 Years on: Is the Oil Industry Doing Enough about Process Safety?. In SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility. Society of Petroleum Engineers.
Schulze, R. (2018, June). Identity and Access Management for Cloud Services Used by the Payment Card Industry. In International Conference on Cloud Computing (pp. 206-218). Springer, Cham
Sharif, S. Z. M., & Abdullah, D. (2018). ZPrivacy Suite: Android Based Permission Manager Incorporated with Firewall Technology. Journal of Computing Technologies and Creative Content (JTeC), 3(1), 7-10.
Singletary, C., & Singletary, J. (2004). U.S. Patent Application No. 10/409,314.
Singletary, C., & Singletary, J. (2004). U.S. Patent Application No. 10/409,314.
Smyth, B. A. (2005). Firewalls: An exploration.
Sun, Q. L. (2015, December). Information in the network environment using computer information security technology. In Intelligent Transportation, Big Data and Smart City (ICITBS), 2015 International Conference on (pp. 474-477). IEEE.
Varadhan, K., & Gomes, J. C. F. (2015). U.S. Patent No. 8,955,100. Washington, DC: U.S. Patent and Trademark Office.
Yan, F., Jian-Wen, Y., & Lin, C. (2015, June). Computer Network Security and Technology Research. In Measuring Technology and Mechatronics Automation (ICMTMA), 2015 Seventh International Conference on (pp. 293-296). IEEE.
Zhao, Z. (2016). Colleges and Universities Digital Archives System Networks Security Research was Studied Based on Firewall Technology. Automation & Instrumentation, 8, 065.