Showing posts from March, 2019

This One is all about Packets

In the earlier blog post on the basics of the firewall, we learned what exactly is a firewall and what does it do? It’s time to learn about the various types of firewalls and how do they function. I will dedicate one post each to the types of the firewall, thereafter jumping to the various kinds of firewall architecture. Packet Filtering Firewall The packet filtering firewall is the most basic of all the firewall types. Taking a cue from the earlier discussed analogy of postman , this type filters the information packets based on rudimentary parameters such as source and destination address, port numbers, traffic direction. A postman also looks at your letter and filters or segregates them on the basis of pin codes, destination address, etc. Packet filtering is a firewall technology that makes access decisions based upon network-level protocol header values. The device that is carrying out packet filtering processes is configured with ACLs, which dictate the type of

The Curious Case of Firewalls

If you are hearing about the term firewall for the first time, and consider it as a wall on fire, you are at the right place. Because that is the overall idea behind this!!! Firewall is one of the most used terms in the field of information security. A lot of people think that deploying this wall of fire will solve all of their problems. Is that so? What is it that a firewall does? Does it come in all shapes and forms? What is actually a firewall? Can I use a virtual firewall?  And many more… All your queries will be solved in this multi-part series on the firewalls. A firewall is used to restrict access to one network from another network. You can think of it as a fence which you implement to keep those pestering pedestrians at bay. The firewall can also help you segregate one network within the overall network from another network. It’s like a door which helps to separate various rooms. For example, if the security administrator wants to make sure employees cannot access

Crime Prevention through Environmental Design (CPTED) Approach

Security design and access control are more than bars on windows, a security guard booth, a camera, or a wall. Crime prevention involves the systematic integration of design, technology, and operation for the protection of three critical assets-people, information, and property. Protection of these assets is a concern and should be considered throughout the design and construction process. The most efficient, least expensive way to provide security is during the design process. Designers who are called on to address security and crime concerns must be able to determine security requirements, must know security technology, and must understand the architectural implications of security needs. Consider the following picture of an office campus below. What do you observe? Note down what all do you think represents this campus. Here are some important points worth mentioning : Well-Paved footpaths. Proper guidance of people entering and leaving by giving them a design