Tweet

Friday, February 21, 2014

Research Paper

Firewall Security
Ashley Hill
George Mason University
IT 103 Sec 002
February 25, 2014
"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code/.  I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site." 








Introduction
      Internet firewalls are a type of security designed to protect computers from other users’ attempts at hacking and accessing information (Seachrist, 1997). According to Seachrist (1997), firewalls simultaneously allow people from the organization employing the firewall to utilize the Internet as well as e-mail. There are five firewall packages that the NSTL evaluates that all run under Windows NT or Unix: “AltaVista Internet Software’s AltaVista Firewall 97 Beta, Check Point Software Technologies Ltd.’s Firewall-1 Version 2.1, CyberGuard Corp.’s CyberGuard Firewall Release 3.0, Raptor Systems, Inc.’s Eagle NT Firewall Version 4.0, and Secure Computing Corporation’s Sidewinder Security Server Version 3.0 (Seachrist, 1997). The purpose of this paper will be to assess the significance of firewalls as well as provide background information on firewalls, list the potential benefits of firewalls, and discuss the legal, social, ethical, and security issues of firewalls.
Background
      The term ‘firewall’ was not coined when the internet was created, the term ‘firewall’ had been used before to describe certain types of barriers in houses and automobiles that slowed down the spread of fires (Avolio, 1999). In the late 1980’s the first firewalls surfaced and were initially used as “router to separate a network into smaller LANS” (Avolio, 1999). The firewalls were initially used to “limit problems from one LAN spilling over and affecting the whole network” (Avolio, 1999). Later in the 1990’s, firewalls were used for security purposes; they served as IP routers with filtering rules (Avolio, 1999). Further down the road, the next type of firewall that was invented by Brian Reid, part of the engineering team at Digital Equipment Corporation; this type of firewall was more intricate, built on bastion hosts, and more commercial since it used filters and application gateways (Avolio, 1999). Marcus Ranum wrote the rest of the firewall code along with new inventions of security proxies (Avolio, 1999). Several other firewalls were created by Cheswick and Bellovin at Bell Labs, Raptor Eagle, DEC SEAL, and ANS InterLock (Avolio, 1999). Firewalls are useful technology and are capable of being beneficial.
Potential Benefits
      There are many potential benefits to firewalls. Regarding the newer firewalls, deep packet inspection firewalls are considered “the best line of defense against worms that can sneak past earlier technology to wreak havoc in corporate networks” (Greene, 2004). Another benefit of firewalls, specifically application firewalls, is that they are equipped with the capability to discover “malicious traffic that stateful inspection firewalls can miss” (Greene, 2004). According to Greene (2004), the firewalls accomplish this by looking for common signs within the packets. Application firewalls also allow “more users to access corporate networks” (Greene, 2004). Greene’s (2004) trade journal provides examples of this stating that NetScreen’s firewall allows Virginia Hospital Center to have access to billing and medical applications. This aspect is resourceful because it allows networks to access each other’s records without actually and physically bringing them to one another. While firewalls are beneficial to networks and people in general, they can bring up some legal and ethical issues.
Legal and Ethical Issues
      With anything, there are some legal and ethical issues concerned with firewalls. The three primary issues will be between decency, free access to information, and freedom of speech and privacy. Regarding decency, firewalls in a workplace setting can be used to prevent any provocative material on the Internet from being viewed. It provides the challenge of filtering out inappropriate content that can be considered risqué and without this, many people will take steps to ensure their environment is clean (Bailey, 2003). The fight for decency though then raises the concern for privacy. Firewalls also include the intrusion of private space. (Bailey, 2003). Most people see this as an unethical act of transgression on their confidentiality and do not like the fact what they view can be monitored. Trailing along with this, another issues arises, the legal issue of free speech. Firewalls have the capability of blocking websites, which allows the administration to block the whole network as opposed to each individual computer (Bailey, 2003).  People feel as though this limits and defies their first amendment rights to look at and write whatever they please. Some people do not appreciate the fact that they cannot do whatever they want on the Internet and find this type of monitoring to be inappropriate. Not only do firewalls suggest some legal and ethical issues, but they also can have some security concerns that, in the end, defeat the overall purpose of having a firewall.
Security Concerns
While firewalls were created to protect computers, but they too can have some security concerns. One concern is how firewalls assign one user to the entire operating system. If one person is the sole owner, a hacker has the potential to have access to the entire network and all of its resources if the hacker gains access to the main user (Seachrist, 1997). Another security issue is that firewalls can only reach so far to protect the network (Grochow, 2005). Grochow (2005) discusses how once accessed through an application that a firewall did not protect, the hacker can see the passwords and data that is passed behind the firewall. He goes on to discuss how everyone with access to applications is allowed full access (Grochow, 2005). Along the same lines, firewalls cannot protect against all attacks such as social engineering, war dialing, denial-of-service attacks, protocol-based attacks, host attacks, password guessing, and eavesdropping (Avolio, 1999). Despite firewalls intended purpose, sometimes firewalls can have malfunctions and loop holes which leaves them with security issues. Security problems are not the only problems that firewalls are capable of having. Their problems reach outside of the technological world and into the real world as they can have some social problems as well. As firewalls develop, hurdles still yet must be overcome until its technology is fully complete.
Social Problems
      While firewalls can keep people out, they can also keep people in and this proposes some social problems. In China, the authorities hold a tight grip on Internet censorship and restrict what the Chinese people can view. Chinese citizens cannot read about sensitive topics as well as being unable to post information that may be used against the government (China, 2013). The article by China’s Correspondent states that China’s Great Firewall, as it is called, is “among the most technically sophisticated internet filtering/censorship systems in the world” (China, 2013). China uses IDs, or intrusion detection systems, which monitor all Internet traffic. It looks at key words that are banned and then stops it from reaching its intended target which then prevents Chinese users from reaching certain browsers allotted outside of China’s domain (China, 2013). These firewalls can bring up a lot of social problems that may also be considered unethical. The government has the potential to govern supposed to be open spaces, like the Internet, by using firewalls. This may cause the Chinese citizens to only become more informed about how to use the Internet so they can go around all of these restrictions. Firewalls can be used for protection, but the power of firewalls can also be abused and used for the worse.
Future Use
      Firewalls have some potential room for growth just like everything else. In the future, firewalls, now being called “next generation firewalls,” will be ”application-aware” because they will be more application based (Messmer, 2013). Many more features will be added to firewalls such as IPS, intrusion-prevention systems, webfiltering, VPN, data-loss prevention, malware filtering, and threat-detection sandbox (Messmer, 2013). Other elements such as mobile devices, tablets, and smart phones bring up new reasons to protect data at several government agencies as well as fire and police departments. Through “centralizing firewall and IPS log feeds, along with server logs, helps the city security determine from a single point what’s a network-security issue that might involve an attack vs. an employee Web issue” (Messmer, 2013). Although firewalls have been proven to be useful, there is always room for improvement; the future for firewalls looks bright.
Conclusion
      Firewalls are useful technologies that serve as a type of security that prevents networks from being hacked. Looking through research, firewalls have many potential benefits that will benefit networks in the long run. While firewalls have benefits, they also have legal and ethical issues such as issues with decency, privacy, and freedom of speech. Not only do they have legal and ethical issues, but they also have security concerns such as loopholes that allow hackers behind the wall. Lastly, discussed were the social problems that come along with firewalls such as how China is using them to keep their Chinese citizens in the dark and quiet. Also, the future of firewalls was peered into since the technology is always growing, becoming more innovative, and developing into more sophisticated technology. It is expanding on several aspects such as new detections and filtering. Although firewalls are resourceful and provide protection, they also display a lot of issues and problems that are sometimes overlooked.





















References
Avolio, Frederic. (1999). Firewalls and internet security, the second hundred (internet) years.
            Date accessed: 21 February 2014. Retrieved from
This website was about firewalls and internet security. It discussed Internet history, firewall history, types of firewalls, packet filtering, circuit gateways, application gateways, what firewalls can do, what firewalls cannot do, firewalls today, and firewalls tomorrow. This journal provided was reliable in terms of the material when used to historical documentation.
Bailey, John. (2003). Ethical issues in firewall administration. Date accessed: 21 February 2014.
Retrieved from
This electronic book discusses the ethical issues in firewall administration especially in
terms of Local Area Networks. The information in this text is reliable and provides much
cited material that proves to be useful.
China Correspondent. (2013). The great firewall of China. Date accessed: 21 February 2014.
Retrieved from
This is an online report from a China correspondent that describes the current status of
China and the hold the government has over the internet. This source is reliable for
information.
Greene, Tim. (2004). The evolution of application layer firewalls. Network World, 21, 20.
ProQuest Research Library. Date accessed: 21 February 2014. Retrieved from     
E8PQ/4?accountid=14541        
This trade journal discussed the different levels of firewalls from packet filters, to stateful inspection, then intrusion detection, and deep packet inspection It goes on to discuss the potential uses of deep packet inspection firewalls. This information is reliable and holds much merit value.
Grocohw, Jerrold. (2005). Firewall’s false sense of security. Computerworld, 39, 23. ProQuest
Research Library. Date accessed: 21 February 2014. Retrieved from
This trade journal discusses how firewalls provide a false sense of security and goes on to talk about the reasons behind why the author believes this. This source is a reliable source of information especially in terms of security concerns.
Messmer, Ellen. (2013). How will cloud, virtualization, and SDN complicate future firewall
security? Date accessed: 21 February 2014. Retrieved from
This article online discusses the future prospects of firewalls and considers elements such as cloud, virtualization, and SDN. This article is very reliable in terms of information and provides resources to back up the information.
Seachrist, David, & Holzbaur, Helen. (1997). Internet firewall software. Computing Canada, 23,
34-35. ProQuest Computing. Date accessed: 21 February 2014. Retrieved from
This magazine discusses how firewalls are becoming essential for companies. It also discussed the different firewall packages, hack attacks, operating system security features, and logging and tracing. The information in this article is reliable and contains many references to support its material.