Friday, October 4, 2024

Types of Firewalls...

It's a Long Slog

For the past few weeks, I have been S-L-O-W-L-Y working my way through the Network Support and Security online class from Cisco Networking Academy.

To be sure, it has been a L-O-N-G slog.

The course contains only three modules:

  • Module 1: Network Support
  • Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks
  • Module 3: Network Security

Like all online classes from Cisco Networking Academy, each module contains several sub-modules. Each sub-module contains numerous definitions, charts, graphics, videos, pull-down menus, lists, and whatnot. If you are trying to take notes as you read each sub-module, it can be a time-consuming process.

When I started the Network Support and Security online course, my initial thought that it would be a quick and easy course to complete.

Boy, I was wrong.

Types of Firewalls

Sub-module 3.5.2 "Types of Firewalls" gives a basic introduction to four different types of firewalls.

The types of firewalls analyzed by the sub-module are:

  • Packet Filtering (Stateless) Firewall
Packet Filtering (Stateless) Firewall
Packet Filtering (Stateless) Firewall 

    • Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information.
      • Source IP address 
      • Destination IP address
      • Protocol
      • Source port number
      • Destination port number
      • Synchronize/Start (SYN) packet receipt
    • Packet filtering firewalls are stateless firewalls that use a simple policy table look-up that filters traffic based on specific criteria. 
    • There are several advantages of using a packet filtering firewall:
      • Packet filters implement simple "permit or deny" rule sets
      • Packet filters have a low impact on network performance
      • Packet filters are easy to implement and are supported by most routers.
      • Packet filters provide an initial degree of security at the Network layer
      • Packet filters perform almost all the tasks of a high-end firewall at a much lower cost.  
    • There are several disadvantages of using a packet filtering firewall: 
      • Packet filters are susceptible to IP spoofing. Threat actors can send arbitrary packets that meet Access Control List (ACL) criteria and pass through the filter. 
      • Packet filters do not reliably filter fragmented packets
        • Because fragmented IP packets carry the TCP header in the first fragment and packet filters filter on TCP header information, all fragments after the first fragment are passed unconditionally. 
        • Decisions to use packet filters assume that the filter of the first fragment accurately enforces the policy. 
      • Packet filters use complex ACLs, which can be difficult to implement and maintain
      • Packet filters cannot dynamically filter certain services
    • Packet filters are stateless. They examine each packet individually rather than in the context of the state of a connection. 
    • Packet filters do not represent a complete firewall solution, but they are an important element of a firewall security policy. 

  • Stateful Firewall
Stateful Firewall
Stateful Firewall

    • Stateful firewalls are the most versatile and most common firewall technologies in use. 
    • Stateful firewalls provide stateful packet filtering by using connection information maintained in a state table. 
    • Stateful filtering is a firewall architecture that is classified at the Network layer. 
    • Stateful firewalls also analyze traffic at OSI Layer 4 (Transport) and Layer 5 (Session).
    • There are several benefits to using a stateful firewall in a network: 
      • Stateful firewalls are often used as a primary means of defense by filtering unwanted, unnecessary, or undesirable traffic. 
      • Stateful firewalls strengthen packet filtering by providing more stringent control over security. 
      • Stateful firewalls improve performance over packet filters or proxy servers. 
      • Stateful firewalls defend against spoofing and DoS attacks by determining whether packets belong to an existing connection or are from an unauthorized source. 
      • Stateful firewalls provide more log information than a packet filtering firewall. 
    • Stateful firewalls also present some limitations
      • Stateful firewalls cannot prevent Application layer attacks because they do not examine the actual contents of the HTTP connection. 
      • Not all protocols are stateful. For example, UDP and ICMP do not generate connection information for a state table, and, therefore, do not garner as much support for filtering. 
      • It is difficult to track connections that use dynamic port negotiation
        • Some applications open multiple connections. 
        • This requires a whole new range of ports that must be opened to allow this second connection. 
      • Stateful firewalls do not support user authentication

  • Application Gateway Firewall
Application Gateway Firewall
Application Gateway Firewall

    • An application gateway firewall (proxy firewall) filters information at Layers 3, 4, 5, and 7 of the OSI reference model. 
    • Most of the firewall control and filtering is done in software. 
    • When a client needs to access a remote server, it connects to a proxy server. 
    • The proxy server connects to the remote server on behalf of the client. 
    • Therefore, the server only sees a connection from the proxy server. 

  • Next Generation Firewall
Next Generation Firewall
Next Generation Firewall

    • Next generation firewalls (NGFW) go beyond stateful firewalls by providing the following: 
      • Integrated intrusion prevention. 
      • Application awareness and control to see and block risky apps. 
      • Upgrade paths to include future information needs. 
      • Techniques to address evolving security threats. 

Additional types of firewalls include:

  • Host-Based (Personal and Server) Firewall - a PC or server with firewall software running on it. 
  • Transparent Firewall - filters IP traffic between a pair of bridged interfaces. 
  • Hybrid Firewall - a combination of the various firewall types. 

I will come back to this post after I complete Module 3.5 Firewalls and Host-Based Intrusion Prevention.

There is a lot of good information about firewalls.

Additionally, I found some really good information and graphics about the different types of firewalls over at Palo Alto Networks' webpage.

As always, more to follow.

Wednesday, October 2, 2024

Lack of Activity on My Blog...

Explaining the Lack of Activity

There has been a significant lack of activity here on my blog.

As per usual, I have been really busy with all kinds of activity.

Here is a list of things that I have been working on:

  • I have been working concerts at the Arizona Financial Theatre in downtown Phoenix, AZ.
  • I have been working at football games at State Farm Stadium in Glendale, AZ.
  • I have started riding my bike again.
  • I have been focusing a lot of time and energy working on the Network Support and Security online class from Cisco Networking Academy.
  • I have been working out at the gym quite a bit.
  • I have been organizing my photos into collections over on Google Photos.
  • I have been trying to come up with a list of blogging post ideas to write about.
  • I even flirted with the idea of moving my blog here at Blogger on to another platform.

I even fell into the bottomless pit that is Twitter/X.

I spent a lot of energy on two very long posts. Moreover, I was underwhelmed by the reaction I got to those two posts. Disappointment aside, I am writing this blog for myself. If other people are interested, then that's great.

Lack of interest in my blog isn't going to deter me. It just means that my blog has yet to find an audience. That will come as I write more posts.

Tuesday, September 17, 2024

Update About My Blog...

Lack of New Posts

Yes, there has been a lack of new posts here on my blog.

I realize that. It needs to be changed.

I spent A LOT of TIME and EFFORT on two specific posts. You can read them here and here.

I also wrote a couple of lengthy posts about my new Sea Sucker Talon bike rack that I bought from REI. You can read those posts here and here.

Yes, there are a couple of recent posts that are INCOMPLETE. I need to circle-back and finish those posts.

For example, I started a post about my recent experience with a pig butchering scam. I am anticipating that the post will be quite lengthy.

I also got distracted with trying to create more elaborate tables on my blog here at Blogger. That opened a whole new can of worms as I tried new techniques for creating tables.

Going through my Bullet Journal, I have all kinds of ideas for future posts here on my blog.

I also need to complete my series about recently completed hikes here in Maricopa County.

As a result, I started creating new albums in my account over on Google Photos.

Unfortunately, there are only so many hours in a day.

\

Saturday, September 14, 2024

Creating Tables on Blogger...

Creating Tables in Blogger

As you may have noticed, when I create a table for my blog here at Blogger, I just use a very simple table that you can make using HTML.

It's a simple technique that does what I need it to do.

However, if you want to create tables with borders, different sizes, padding and spacing, and so on, apparently you need to use CSS (Cascading Style Sheets).

That's all well and good; however, I just cannot seem to get Blogger to let me use CSS to alter the characteristics of a table.

I am sure that there is a way to get Blogger to let do what I want to do when it comes to making a table.

I haven't found it.

While searching the help feature on Blogger, I found the instructions on how to use CSS to change the formatting of my blog.

For now, I am happy with the look of my blog.

New Technique for Creating Tables

Recently, I performed a search on Google, looking for a way to create more complex tables on Blogger.

One easy technique that I found was to create a table on a word processing application, such as Microsoft Word.

Once your table is complete, you then copy and paste the table into Blogger using the Compose View option.

Well, I tried that out. It worked.

To an extent.

Unfortunately, while in Compose View, you cannot alter the length of the cells in you table.

The obvious solution was to then go from the Compose View to the HTML View for my blog post.

Ideally, while in HTML View, you could, in theory, directly change the HTML code for your table.

Sounds all fine and good, right?

Well, it gets rather tricky.

When you look at the HTML code for the table you created using Microsoft Word or, in my case, Google Documents, Blogger will give you a huge mess of HTML code to go through in order to change the characteristics of the table.

I tried doing just that on my table.

It turned out to be a mess.

I even tried copying the HTML code from the HTML View in Blogger to Google Documents and then separating each line of HTML code.

After doing that, I was hoping to be able to locate what specific part of HTML code I needed to change to get the effect I desired on my new table, i.e., changing the width of the cells (or columns).

Again, something so simple turned out to be a mess.

In Conclusion

For now, I will just continue on with making simple tables for my blog here at Blogger.

It's simple and easy for the information that I am trying to convey.

It's not a problem.

I will keep on experimenting with directly changing the HTML code of the table in Google Documents. I am sure that is the correct technique, but it will take longer than five minutes to complete.

If my memory is correct, the issue I am having with altering the look of tables is an example about the limited functionality of Blogger itself.

Blogger was designed to be a simple way for someone to create a blog without any knowledge of HTML.

For now, that's all well and good. Blogger suits me just fine for what I want to do with my blog.

Perhaps later on I will consider making a change and start using a different blogging platform with more advanced features, such as WordPress or Squarespace.

We'll see...

UPDATE: I recently went over to the W3 Schools website and took another look at making tables in HTML. I copied the code for the basic table and pasted it into Blogger. When I went into Compose View, the table didn't show up. However, when I clicked on Preview, the table appeared exactly how it does on the W3 Schools website. That was a breakthrough. Thus, in order to make a table in Blogger, I will have to actually manipulate the code to create the table that I want. Got it.

Thursday, September 12, 2024

Starting Module 3 Network Security...

Starting Module 3 Network Security

The other day, I FINALLY made it to "Module 3: Network Security" in the Network Support and Security online course from Cisco Networking Academy.

Boy, it was a long SLOG to get through "Module 2: Cybersecurity Threats, Vulnerabilites, and Attacks".

I will have more to write about this later.

Module 3: Network Security
Module 3: Network Security


Module Objective: Configure secure user access on a network.

Here are the objectives for Module 3:


Topic Title Topic Objective
Security Foundations Explain foundational security concepts.
Access Control Configure access control.
Defending Systems and Devices Explain cybersecurity processes and procedures that protect systems.
Antimalware Protection Explain methods of mitigating malware.
Firewalls and Host-Based Intrusion Prevention Explain how firewalls operate to filter traffic and recommend endpoint security measures.
Secure Wireless Access Configure basic wireless security on a home router (WPAx).

Sunday, September 8, 2024

Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2...

Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2

I haven't been posting a whole lot here on my blog.

I had completed two rather lengthy posts on my blog. It took a lot of effort to complete those two posts. There are additional lengthy posts in the pipeline.

Recently, I have been busy doing everything else except for posting to my blog.

One thing that I have been spending A LOT of time on is the Network Support and Security online class from Cisco Networking Academy.

For the past couple of weeks, I have been working my way through "Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks". In fact, I wrote a post right here on my blog about beginning the second module of the Network Support and Security online class. You can read that post right here.

To say that my progress through the course has been slow is an understatement.

As I mentioned in a short post that I published on LinkedIn, I have already been exposed to a significant portion of the information about cybersecurity threats due to security briefings I had been given while in was in the Army, worked as a DoD contractor, and as an IT help desk employee at the Social Security Administration. However, it is a lot of information to absorb, so it is a good idea to review the nature of cyber attacks from time to time.

Module 2.0 Introduction
Module 2.0 Introduction

Module 2.1 Common Threats
Module 2.1 Common Threats

Module 2.2 Deception
Module 2.2 Deception

Module 2.3 Cyber Attacks
Module 2.3 Cyber Attacks

Module 2.4 Wireless and Mobile Device Attacks
Module 2.4 Wireless and Mobile Device Attacks

I just started working on "Module 2.5 Application Attacks". It is the last section for Module 2:  Cybersecurity Threats, Vulnerabilities, and Attacks

Module 2.5 Application Attacks
Module 2.5 Application Attacks




Sunday, September 1, 2024

My Experience with a Pig Butchering Scam

Introduction

A few months ago, I was almost the victim of what is known as a pig butchering scam.

This will probably end up being a very lengthy post that will take some time to write.

Hopefully, my experience might be of use to someone.

Here is my rough outline for this post.

Moving Back to Arizona

New Membership on Plenty of Fish

Using What's App

What is Calculate BAT?

Christmas in San Francisco

The Hardsell

What is Pig Butchering?

In Conclusion

UPDATE: I REALLY need to work on this post. Now, I keep meeting people on Twitter/X that may or may not be a cryptocurrency scammer. On the other hand, after doing extensive research, I have concluded that there are legitimate ways to make money from investing in cryptocurrencies. For far too long, I let my experience with being the target of a pig butchering scam affect my opinion on cryptocurrencies. Still, there are cryptocurrency scammers out there that people should be aware of.