Deployment of Firewall and Intrusion Detection and Prevention Systems Descriptive Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

The combination of hardware and software that selectively allows communication between a computer and a network is known as a firewall (Fithen, Allen & Stoner, 1999). It inspects the traffic during a network communication and blocks or permits passage depending on a given set of rules. The term Intrusion Detection and Prevention Systems (IDPS) refers to both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).

Intrusion Detection is a process of monitoring the activities occurring in a computer network and determining if they are in violation of standard security policies. The software that automatically carries out the process is known as IDS. IPS is able to carry out the intrusion detection process and can try to stop the intrusion/violation (Scarfone & Mell, 2007).

Various firewall arrangements can be used for multitier applications accessible from the World Wide Web and from an internal network. Multitier web applications of moderate complexity are segmented into three tiers.

The first tier is made up of the presentation components that are accessible directly by end users. The second tier is composed of middleware components that execute the end users’ requests. End users cannot access them directly. The third tier consists of data components. They are the most sensitive and are hosted by databases or directory servers.

Firewall deployment is based on three strategies. The first strategy is the single firewall strategy, which is used to protect all the three tiers from the internet and internal network. All the communication going in and out of the three tiers goes through a single firewall. The firewall offers equal protection to all the servers but can subdivide the network into different subnets and offer different protection level to the subnets.

Firewall in series strategy is whereby several firewalls are deployed to eliminate reliance on a single firewall. The firewalls are deployed one behind another and therefore the more sensitive tiers are behind more firewalls. For example, the data components tier would be behind both the firewall protecting it and the one protecting the middleware components and presentation components. The last strategy is the hybrid strategy, which uses only two firewalls.

Either presentation servers and middleware servers or data servers and middleware servers are grouped together. Although two tiers are grouped together, they remain under dedicated subnets. In the first grouping, presentation servers and middleware servers are behind one firewall while data servers are behind two firewalls. All firewall arrangements are on the internal side of a router.

IPS is always deployed inlinewhile IDS can be deployed inline or out-of-band. When connected out-of-band, it uses a hub, a spanning port or a network tap. Deploying both ISP and IDS is more beneficial and to do this, a router must be introduced. The IPS is connected on the external side of the router and the IDS is connected in internal side of the router either inline or out-of-band (Pappas, 2008). The IDS placed on the inside section of the edge router allows analyzing of communication within the internal network.

The use of firewalls and IDPS is beneficial. Firewalls block network traffic that may be violating the security policy of an organization. Such traffic may include viruses, spam, email bombs and unwanted material. IDPS detect and stop malicious incidents that would compromise security of a given computer system. They can detect when an attacker has compromised the system and stop suspicious file transfers. By identifying reconnaissance activities, they can prevent eminent future attacks.

Reference List

Fithen, W.L., Allen, J.H. & Stoner, E., (2008). Deploying firewalls. Software Engineering Institute. Web.

Pappas, N. (2008). . SANS institute. Web.

Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems(IDPS). Computer security resource center. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, June 28). Deployment of Firewall and Intrusion Detection and Prevention Systems. https://ivypanda.com/essays/deployment-of-firewall-and-intrusion-detection-and-prevention-systems/

Work Cited

"Deployment of Firewall and Intrusion Detection and Prevention Systems." IvyPanda, 28 June 2018, ivypanda.com/essays/deployment-of-firewall-and-intrusion-detection-and-prevention-systems/.

References

IvyPanda. (2018) 'Deployment of Firewall and Intrusion Detection and Prevention Systems'. 28 June.

References

IvyPanda. 2018. "Deployment of Firewall and Intrusion Detection and Prevention Systems." June 28, 2018. https://ivypanda.com/essays/deployment-of-firewall-and-intrusion-detection-and-prevention-systems/.

1. IvyPanda. "Deployment of Firewall and Intrusion Detection and Prevention Systems." June 28, 2018. https://ivypanda.com/essays/deployment-of-firewall-and-intrusion-detection-and-prevention-systems/.


Bibliography


IvyPanda. "Deployment of Firewall and Intrusion Detection and Prevention Systems." June 28, 2018. https://ivypanda.com/essays/deployment-of-firewall-and-intrusion-detection-and-prevention-systems/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1