From the course: Complete Guide to Open Source Security

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

The basics of firewall operation

The basics of firewall operation

- [Instructor] While many of today's breaches result from malware being delivered through web browsing and email accounts, direct penetration through hacking is still a significant issue. A key control to prevent this is the use of perimeter firewalls. These come in two forms, host firewalls on endpoint devices, such as Windows 11 Defender, and network firewalls, which are used to segregate the network into subnets. While their situation is different, they do operate in essentially the same way. A firewall, in its simplest form, is designed to mediate access between computers in different zones. Typical examples, being an internet user browsing the internet. Browsing to an internal intranet web server and accessing a file server. And an external user accessing a public web server, but being denied access to our internal file server and workstations. To do this, a firewall has a set of rules which instructs it to either allow or deny traffic to flow between the internal and external…

Contents