Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

1. Give at least 5 different types of firewalls that were not discussed in the video.

In your
discussion, include their functions.
 New Generation Firewalls – these are the latest released firewall. There is no
specific definition but mostly described as a firewall which contains different
features and functions of other firewalls. They may include deep-packet
inspection (DPI), surface-level packet inspection, and TCP handshake testing, etc.
This uses higher level of security than of the other traditional firewalls and are
designed for more sophisticated security threats (JavaTPoint, 2012).
 Network Address Translation Firewall – it operates on router to protect private
networks. It only allows internet traffic to pass through if a device requesting is
on the private network. It protects the identity of a network and do not expose the
internal IP addresses to the internet (Nakutaviciute, 2019). Basically, it hides the
IP addresses of devices from attackers or outsiders.
 Cloud Firewalls – known as the FaaS. They are operated in the internet and
considered similar to proxy firewall. The best function or feature would be the
scalability because they don’t have physical resources (JavaTPoint, 2012). They
may be configured based on requirements but it is mostly used by organizations to
secure its internal networks. This firewall is form virtual barriers around cloud
platforms (Cloud Flare, 2022).
 Unified Threat Management – they are special type of device that has some
features and functions of a stateful inspection firewall with anti-virus and
intrusion prevention support (JavaTPoint, 2012). They are made for easy use and
simplicity. They can also be configured or add many other services.
 Circuit-Level Gateways – these firewalls work at the session layer of the OSI
model. The main function is to ensure the established connections are safe (Simic,
2020). These insect the information contained about the transaction and not the
actual data. These provide data hiding and protection against address exposure.
2. Discuss what is VPN and why is it useful?
VPN stands for Virtual Private Network and describes the opportunity to establish a
protected network connection when using public networks (Kaspersky, 2022). VPN protects
your online activities and identity by encrypting the traffics that make it difficult to be attacked.
It hides the IP address by redirecting on a specially configured remote server run by a VPN host.
The VPN server now becomes the source of data. The ISP and other third parties cannot see your
online activities or what you receive and send online. It is like a filter that turns all your records
online to something that possible attackers or third parties cannot understand. So even if they
will acquire what your activities or your data online, it would not relay the actual data and would
be useless.
It is useful as ISP usually tracks and can record everything you do online, and you may opt to
some services which are only protection from third parties but when you use VPN, it is more
likely that your personal activity, data, information, transactions or everything you will do online
cannot be manipulated by any endpoints, third parties or even your internet service provider.
Bibliography
Cloud Flare. (2022). Retrieved from Cloud Flare Website:
https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/#:~:text=A%20cloud
%20firewall%20is%20a,a%2Dservice%20(FWaaS).

JavaTPoint. (2012). Retrieved from JavaTPoint Website: https://www.javatpoint.com/types-of-


firewall#:~:text=There%20are%20mainly%20three%20types,to%20achieve
%20maximum%20possible%20protection.

Kaspersky. (2022). Retrieved from Kaspersky Website: https://www.kaspersky.com/resource-


center/definitions/what-is-a-vpn

Nakutaviciute, J. (2019, December 17). NordVPN. Retrieved from


https://nordvpn.com/blog/what-is-nat-firewall/#:~:text=A%20Network%20Address
%20Translation%20(NAT,IP%20addresses%20to%20the%20internet.

Simic, S. (2020, July 9). PhoenixNAP. Retrieved from https://phoenixnap.com/blog/types-of-


firewalls

You might also like