Over the last few years online security threats has grown dramatically. A computer user connected to internet and don’t have firewall installed then it’s a real concern for that computer user. Firewalls installed three years back are not suitable in current context and new threats and attacks. A firewall is a system designed to prevent unauthorized access to or from a private computer network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet (often described as intranets). All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Why we need a Firewall?
Firewall protects your important data from unauthorized access, malicious users and accidents that originate outside your network. Firewall has one very good feature that is access control, access control means distinguish between good and bad traffic.
Threats for Firewall
Malware: Malware is a combination of the words ‘malicious’ and ‘software’ and includes viruses, Trojan horses, worms, spyware/adware, phishing and pharming. Most common way to get malwares is opening E-Mail attachments and clicking URL’s that are present in E-Mail’s. Viruses, Trojans and worms can do a lot of bad things on your computer or in business.
Spam: Dealing with Spam can affect your productivity very much. Spam mail contains Trojan, Viruses and phishing E-Mails. Phishing is about fake e-mails trying to extract sensitive information, such as your bank passwords or credit card details and a variation of this is pharming, where the criminal sets up a fake Web site which looks like one you normally use, typically a banking site. Once you enter your details, the criminal is able to plunder your account.
Unauthorized Access: Passwords can’t do everything to restrict unauthorized access. Authentication with tokens provides a better authentication over the passwords. Other problems include data linkage means when laptop is stolen some solution for this problem is encrypt all your data or track your stolen laptop. All wireless use is risky and requires a specific wireless firewall, and wireless VPN for remote access
A firewall is no longer enough to protect a network. Other security solutions to combat the threats outlined above are also necessary.
Source : biosmagazine