Pros, And Cons: Firewalls And Encryption

1680 Words null Page
Firewalls & Encryption A firewall is basically anything that filters the transmission of packets of digital information as it tries to pass through a network. A firewall can be hardware or software as well as a combination of both. The ideal configuration consists of both software and hardware firewalls. “A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination (Beal, 2010).” Hardware firewalls are usually found in broadband routers. However, they can also be purchased as a stand-alone product. “Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network (Beal, 2010).” Software firewalls are the most popular choice for …show more content…
“A software firewall will protect your computer from outside attempts to control or gain access your computer, and, depending on your choice of software firewall, it could also provide protection against the most common Trojan programs or e-mail worms (Beal, 2010).” However, software firewalls only protect the computer it’s installed on. Software firewalls do not protect a network which means every computer would need the software firewall installed on it. Some software firewalls include privacy controls and web filtering. Considering that hardware and software firewalls both have pros and cons, it would seem very beneficial to use both in order to achieve the maximum benefit of having a well-protected computer and network.
Firewalls perform two basic security functions which are packet filtering and application proxying. “Packet filtering is a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the
…show more content…
Symmetric encryption is where you use the same key to encrypt and decrypt the same information. “This means that the same information is required or used during the encryption and decryption process. Being the same encryption key for both ends, it must be kept secret. This therefore means that if a person gets the key, he or she can read all the information that we had encrypted (“An Overview of Cryptography Basic Concepts”, n.d.).” If a key gets lost, it’s important to replace it immediately. Symmetric encryption is very fast to use due to the very few resources it requires. Some people will use both symmetric and asymmetric encryption because of the security benefits. Asymmetric encryption is often referred to as public key cryptography because there are two keys that are needed. One of the keys is private and cannot be shared with others. There is also a public key that everyone can have access to. However, you can’t decrypt data using a public key. “With the combination of symmetric and asymmetric encryption, there is a lot of flexibility in terms of encrypting the data, sending it to other people and decrypting it (“An Overview of Cryptography Basic Concepts”,

Related Documents