Abstract
The work briefly reviews the history, types, and capabilities of the main types of firewalls (FW). Firewalls are an important tool for protecting network resources from various information security threats. With the development of technology and the changing nature of attacks, especially those involving artificial intelligence (IoT), firewalls have also evolved, acquiring new functions and capabilities. This work provides a short survey of the main types, and capabilities of firewall technology, providing solutions to issues of comprehensive protection of network equipment and information resources from modern security threats. Different types of firewalls are used depending on the conditions of operation and purpose of the basic information and communication system (ICS), as well as on the place of their (FW) integration into the network or virtual infrastructure of modern information systems. For integrated networks that require a high level of their security, productivity and flexibility, firewalls of the business segment of generation «Next-generation» and «Threat-focused NGFW» are definitely the best choice. Attention was drawn to the fact that mobile firewalls should in every way contribute to the maintenance of resource consensus and eliminate a possible disparity in the performance of networked mobile applications. Adaptability to mobility of current communication systems (Wi-Fi, GSM and others) determines the specificity of security threats for mobile devices and It defines their key feature. This feature is based on permanent readiness for seamless transitions (reconnections) between different networks in conditions of constant energy shortage and limited available computing resources (meaning gadgets). Highlights the main trends, prospects for the development and implementation of different types of firewalls, including the impact of artificial intelligence, machine learning, cloud technologies and the Internet of Things as well as important aspects of their (FW) scope. It is emphasized that the introduction of FW does not replace other security technologies and tools, but effectively expands the existing arsenal of countering new security threats (primarily as an instrument of proactive countermeasures and rapid response to complex network incidents). The article may be useful for students, researchers, and information security professionals who seek to expand their competencies related to the development and operation of modern means of network protection.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.