{"id":104774,"date":"2021-05-06T10:55:14","date_gmt":"2021-05-06T05:25:14","guid":{"rendered":"https:\/\/www.mapsofindia.com\/my-india\/?p=104774"},"modified":"2021-05-06T08:59:30","modified_gmt":"2021-05-06T03:29:30","slug":"what-is-the-meaning-of-firewall-security-in-computer-know-the-types-and-generations","status":"publish","type":"post","link":"https:\/\/www.mapsofindia.com\/my-india\/technology\/what-is-the-meaning-of-firewall-security-in-computer-know-the-types-and-generations","title":{"rendered":"What is the Meaning of Firewall Security in Computer? Know the Types and Generations"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">A Firewall is a cybersecurity tool that oversees and filters incoming and outgoing traffic on a network depending on an organisation&#8217;s previously organised security policies. It acts as a barrier between a private internal network and public internet sources. Hardware, software or cloud-based are among those called firewalls. A firewall&#8217;s primary aim is to permit\u00a0<\/span><span data-preserver-spaces=\"true\">non-threatening traffic and keep unsafe traffic out of the zone with the prevention of any risk. It ceases any harmful traffic requests and data packets while making the accurate traffic pass through the way. It takes the guesswork out of host-level protection and enables them to your network security device.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">History of Firewall<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Since the 1980s, firewalls have become packet filters that were arranged to assess packets and bytes shared between computers. Although, packet filtering firewalls are still functional in the prevailing times. As the technology evolved over the decades, they have also reached far-long use by the people.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Check Point CEO Gil Shwed set up the first stateful inspection firewall named FireWall-1 in 1993. After twenty-eight years of its introduction, a firewall remains an organisation&#8217;s first line of defence against cyber attacks. Today&#8217;s firewalls which comprise Next-Generation Firewalls and Network Firewalls, back a wide variety of operations tasked with capabilities with built-in features including Application and Identity-Based Control, Network Threat Prevention, Hybrid Cloud Support and Scalable Performance.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Five Firewall Generations<\/span><\/h2>\n<ol>\n<li><u><span data-preserver-spaces=\"true\">Generation 1 Virus<\/span><\/u><span data-preserver-spaces=\"true\">: In the 1980s, virus attacks on stand-alone PC&#8217;s impacted all businesses and drove antivirus products in the system.<\/span><\/li>\n<li><u><span data-preserver-spaces=\"true\">Generation 2 Networks<\/span><\/u><span data-preserver-spaces=\"true\">: Cyberattacks affected all businesses and drove the creation of the firewall in the mid-1990s.<\/span><\/li>\n<li><u><span data-preserver-spaces=\"true\">Generation 3 Applications:<\/span><\/u><span data-preserver-spaces=\"true\">\u00a0In the 2000&#8217;s, exploiting vulnerabilities in applications hit most businesses and drove Intrusion Prevention Systems Products (IPS).<\/span><\/li>\n<li><u><span data-preserver-spaces=\"true\">Generation 4 Payload<\/span><\/u><span data-preserver-spaces=\"true\">: Nearly the year 2010 witnessed the increase of target, unknown, evasive and polymorphic attacks, which hit most businesses and drove anti-bot and sandboxing items.<\/span><\/li>\n<li><u><span data-preserver-spaces=\"true\">Generation 5 Mega<\/span><\/u><span data-preserver-spaces=\"true\">: Approx. 2017, Huge scale, multi-vector, mega attacks using enhanced attack tools in nearly 2917 and is creating enhanced threat prevention ideas and solutions.<\/span><\/li>\n<\/ol>\n<h2><span data-preserver-spaces=\"true\">\u00a0<\/span><span data-preserver-spaces=\"true\">Types of Firewall<\/span><\/h2>\n<ul>\n<li><u><span data-preserver-spaces=\"true\">Packet-Filtering Firewalls:<\/span><\/u><span data-preserver-spaces=\"true\">\u00a0Being the most fundamental and oldest among all. Packet-filter makes a checkpoint at a traffic router or switch. It runs a simple check of the data packets coming via the router. It evaluates details such as packet type, the destination and origination IP address, port number and other surface-level information with the closing structure of the packet to inspect its contents. If the information packet doesn&#8217;t clear the inspection, it is leftover and not taken into consideration. They are not resource-intensive, which implies they don&#8217;t have a colossal impact on the system&#8217;s activities and are relatively easy.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">\u00a0<\/span><u><span data-preserver-spaces=\"true\">Proxy firewalls<\/span><\/u><span data-preserver-spaces=\"true\">: They function at the application layer to filter incoming traffic between the network and the traffic source, which leads to the characterisation of &#8220;application-level gateway.&#8221; These firewalls are via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy firewall first establishes a connection to the traffic source and inspects the incoming data packet. <\/span><span data-preserver-spaces=\"true\">This check resembles the stateful inspection firewall in that it considers both the packet and the TCP handshake protocol. Proxy firewalls may also run deep-layer packet inspections, assessing the actual contents of the information packet to confirm that it includes no malware. Once the check is accomplished and the packet is sanctioned to link to the destination, the proxy sends it off. It develops an extra layer of separation between the &#8220;client&#8221; (the system where the packet originated) and the individual devices on the network, concealing them to create additional anonymity and safeguard the network.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">\u00a0<\/span><u><span data-preserver-spaces=\"true\">Next-Generation Firewalls<\/span><\/u><span data-preserver-spaces=\"true\">: Most of the recently introduced firewall products are being known for &#8220;next-generation&#8221; architectures. However, there is not as much agreement on what makes a firewall truly next-generation. Some usual features of next-generation firewall architectures consist of deep-packet inspection (assessing the actual contents of the data packet), TCP handshake checks, and surface-level packet inspection.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A Firewall is a cybersecurity tool that oversees and filters incoming and outgoing traffic on a network depending on an organisation&#8217;s previously organised security policies. It acts as a barrier between a private internal network and public internet sources. Hardware, software or cloud-based are among those called firewalls. A firewall&#8217;s primary aim is to permit\u00a0non-threatening [&hellip;]<\/p>\n","protected":false},"author":21815,"featured_media":104783,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6124],"tags":[],"class_list":{"0":"post-104774","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/104774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/users\/21815"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/comments?post=104774"}],"version-history":[{"count":2,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/104774\/revisions"}],"predecessor-version":[{"id":104784,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/104774\/revisions\/104784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/media\/104783"}],"wp:attachment":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/media?parent=104774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/categories?post=104774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/tags?post=104774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}