Cybersecurity: IP and System Security
├── 1. IP Security (IPSec)
│ ├── Authentication Header (AH)
│ └── Encapsulating Security Payload (ESP)
│
└── 2. System Security
├── Intruders
├── Intrusion Detection System (IDS)
├── Viruses
├── Firewall Design Principles
├── Trusted Systems
├── OS Security
└── Program Security
Feature | AH | ESP |
---|---|---|
Encrypts data? | No | Yes |
Verifies sender? | Yes | Optional |
Checks for tampering? | Yes | Yes |
Protects header? | Some parts | More parts |
Used for privacy? | No | Yes |
Firewalls are a critical line of defense for any network, but to be truly effective, they need to be thoughtfully designed. Below are the key principles to guide you when building or managing a firewall system.
Before setting up a firewall, you need a well-defined security policy — this acts as the blueprint for what your firewall should allow or block. A clear policy ensures your firewall protects the right things without overcomplicating the setup.
Having a policy helps you avoid vague rules like “block bad traffic” and instead focus on meaningful, targeted protection.
When designing firewall rules, simplicity wins. A clean, minimal rule set is easier to manage, reduces errors, and improves security.
A simple setup leads to better visibility, easier troubleshooting, and faster updates.
Firewalls come in different types — each suited for specific needs. Choosing the right one depends on your network's size, complexity, and security demands.
Select based on your current needs and future scalability.
Firewalls are strongest when used as part of a layered security approach. Relying on just one security layer is risky — multiple layers create backup protection.
It’s like having multiple locks on a door — more barriers mean better security.
Firewalls shouldn’t just focus on threats from the outside. Internal users can also pose risks — intentionally or by accident.
Employees might fall for phishing emails or unknowingly install malware, so your firewall strategy must account for internal risks too.
' OR 1=1 --
to bypass passwords).