Week 6

Week 6: Firewalls and Intrusion Detection Systems
Computer networks are either connected locally or through the internet that distance does not server as a barrier. Since they are connected via the internet, they are bound to fall prey of intrusion against the network by unauthorized to steal or destroy information of an organisation (Vacca & Ellis, 2005).
In a network, firewalls serve as security guard by enforcing organisation’s security policy against intruders(Liu, 2009). Hence, they the restriction touches either incoming or outgoing interaction through network IP address with their ports and clients. The packets that flows through the network do not just go like that but they are subjected to filtering at the network level, only successful ones scale through while failed ones are bared (Liu ; Gouda, 2009). Where there is an attack with the presence of a firewall, it is as a result of wrong plan, implementation and rollout(Khari, Gaur, ; Tuteja, 2013)
In other words, intrusion detection systems serve as an alarm system to the network by monitoring unauthorized traffic across the entire system(Day, 2013). It alerts the administrator either via email, SMS message, an alarm or any form of notification that an attempt has been made against the network. Such intrusion is to disrupt normalcy in the network by rendering it useless. It may end up installing malware that will lead to denial of servers (DoS) completely. Its preferred use is for stopping an attack at its initial stage by preventing its spread across the network. However, the actions of combatting such instruction and done real-time based on firewalls configuration for IP address blockage against intruders.

According to (Sharma, Jindal, ; Sharma, 2014) just installing a firewall alone will not assure full service until intrusion detection system is install along site for a complete systems. In order to have a robust protection against unauthorized user, both firewall and intrusion detection system should be install so that each will perform its function(Newman, Asuncion, Smyth, ; Welling, 2009). Tools that are available for IDS and firewalls could either be software or hardware in nature. Penetration testing is one of the tools that is being employed today to help performing penetration test from intruders (Rogova, 2017). Network intrusion prevention system (NIPS) is a hardware that monitors traffic

Looking at cost against potential commercial solutions, or firewalls that are considered based on speed their cost is always on the high side due to hardware firewall not a software firewall (Fulp, n.d.). In another study conducted by (Fanning, 2015), they found out that malware is one of the harmful computer utility and will cost the family a fortune. To avoid such, cost of malware should be included in the general information technology budget. In my own opinion based on (Potter, 2006) I will recommend an opensource firewall as against the enterprise one as a result of the cost. In most cases, if you weight the cost of an enterprise firewall, you will find out that it is not worth it since free and opensource will do the work.
Day, C. (2013). Intrusion Prevention and Detection Systems. Computer and Information Security Handbook. Elsevier Inc. https://doi.org/10.1016/B978-0-12-394397-2.00026-X
Fanning, K. (2015). Minimizing the Cost of Malware. Journal of Corporate Accounting ; Finance. https://doi.org/10.1002/jcaf.22029
Fulp, E. W. (n.d.). Chapter e29, 1–20.
Khari, M., Gaur, M., ; Tuteja, Y. (2013). Meticulous Study of Firewall Using Security Detection Tools. International Journal of Computer Applications ; Information Technology.
Liu, A. X. (2009). Firewall policy verification and troubleshooting. Computer Networks. https://doi.org/10.1016/j.comnet.2009.07.003
Liu, A. X., ; Gouda, M. G. (2009). Firewall policy queries. IEEE Transactions on Parallel and Distributed Systems. https://doi.org/10.1109/TPDS.2008.263
Newman, D., Asuncion, A., Smyth, P., ; Welling, M. (2009). Distributed Algorithms for Topic Models. The Journal of Machine Learning Research, 10, 1801–1828. Retrieved from http://dl.acm.org/citation.cfm?id=1577069.1755845
Potter, B. (2006). Open source firewall alternatives. Network Security. https://doi.org/10.1016/S1353-4858(06)70325-7
Rogova, E. (2017). Testing of Network Security Systems Through DoS. MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING.
Sharma, M., Jindal, K., ; Sharma, B. K. (2014). Analysis of IDS Tools ; Techniques. International Journal of Emerging Technology and Advanced Engineering Website: Www.Ijetae.Com.
Vacca, J. R., ; Ellis, S. R. (2005). Firewalls. Firewalls. https://doi.org/10.1016/B978-155558297-5/50017-7