- Cybersecurity Snacks
- Posts
- Role of Firewalls in Cybersecurity
Role of Firewalls in Cybersecurity

Nathanael/Cybersecurity Snacks
Good morning. Today, we are covering the role of firewalls in cybersecurity. We are also covering the types of firewalls and their unique roles. As usual, we will also bring you the latest news and jobs in the cybersecurity field. We end today’s newsletter with a wisdom quote. First time reading? Sign up here
Main Meal
🛡️ Firewalls are the unsung heroes of cybersecurity. They act like bouncers at a club, deciding who gets access to your network and who doesn't. Just imagine them as gatekeepers, working 24/7 to keep cyber threats out.
🚨 A firewall can either be hardware or software-based. It scrutinizes incoming and outgoing traffic based on pre-set rules. If something looks suspicious - boom. The door is slammed shut.
💼This protection layer is crucial because it keeps hackers and malicious programs at bay, maintaining the integrity of sensitive data inside your system. Nonetheless, not all firewalls are the same - some offer more advanced capabilities to provide added safety.
Types of Firewalls and Their Unique Roles
🍕 You might think firewalls are all the same, but that's like saying every pizza has pepperoni. Let me tell you, they're as different as deep dish and thin crust.
🔍The first type is a Packet-Filtering Firewall. This guy checks packets coming in against your computer's IP address - kind of like a bouncer checking IDs at the door. If it doesn't match up, it gets booted out.
👀The second type is a Stateful Inspection Firewall. Think of this one as an upgrade to packet-filtering - not only does it check IDs (IP addresses), but also keeps tabs on active connections. It remembers who you've talked to.
🛡️ The third type is a Proxy Firewall. This firewall serves as your personal bodyguard in cyberspace; acting between your system and potential threats.
Key Features of Effective Firewall Systems
🌐 A top-notch firewall has some critical features. It should offer packet filtering, which means it checks packets of data for any issues. This is like a security guard checking everyone who comes into a building.
🌟 An effective firewall also gives network address translation (NAT). NAT hides user IP addresses while online to provide an extra layer of privacy and security.
🔎 The best firewalls have Stateful Multilayer Inspection (SMLI). SMLI reviews data at various layers to make sure nothing suspicious gets through.
🔒 Finally, VPN support is vital. A good firewall lets users securely connect from different locations - think working from your favorite coffee shop without worry.
Challenges and Limitations of Using Firewalls
⚠️Like those beefy gatekeepers, firewalls have their limitations too.
🚫 The first hurdle is false positives. Sometimes, a firewall can block legitimate traffic by mistake. This issue isn't just annoying; it can hamper business operations if not fixed promptly.
🕵️ The second challenge is that some cyber threats still manage to sneak past them. According to Symantec's feature story, certain types of malware and advanced persistent threats (APTs) can bypass even robust firewalls.
💻Lastly, managing firewalls needs expertise. You need someone who knows how to tweak settings or react when an alarm bell rings from potential threats - kind of like having your own personal cybersecurity DJ.
News

Lightman/Pixabay
Google Settles $5 Billion Lawsuit for Tracking Users in 'Incognito Mode'
Google agreed to settle a $5 billion lawsuit alleging that it persistently tracked users even when they were using the 'incognito' mode in the Chrome browser. The class-action lawsuit initiated in 2020 accused Google of deceiving users by suggesting that their internet activities wouldn't be tracked in incognito mode. The lawsuit contended that, despite claims of privacy, Google's advertising technologies and various methods still recorded user site visits and online actions [more]
Massive Cybersecurity Breach at Xfinity Puts Over 35 Million People at Risk
Comcast's Xfinity service experienced a data breach, potentially impacting over 35 million customers. The breach, which exposed sensitive customer information, highlights the challenges in protecting personal data. Hackers accessed the system through a vulnerability in third-party software, emphasizing the vulnerabilities in the supply chain. Xfinity has advised customers to take proactive measures to protect their information [more]
Orbit Chain's Bridge Hacked for $81.5 Million
In a major security breach, Orbit Bridge, a cross-chain bridge protocol, has been hacked and $81.5 million worth of cryptocurrencies have been stolen. Concerns were raised on December 31st and the hack has been verified by cybersecurity firm Cyvers [more]
Vancouver Rape Crisis Centre Faces Privacy Concerns After Server Theft
The theft of a server containing sensitive data from a Vancouver rape crisis center has raised concerns about data privacy. Cybersecurity experts warn of significant risks, including the potential release of personal information, and call for improved data security measures and proactive protection of vulnerable individuals [more]
Major Cyber Attack Exposes Australian Court's AV Network
Hackers have breached the AV network of the court system in the Australian state of Victoria, accessing and potentially stealing video and audio recordings of court hearings over a seven-week period. Court Services Victoria is working to strengthen security and restore the affected network. No ransomware demands have been revealed [more]
Ohio Lottery Suffers Ransomware Attack with Alleged Theft of Employee and Player Data
The Ohio Lottery has acknowledged being the victim of a cyberattack, with a ransomware group alleging they have extracted substantial data from the organization's systems. On its website, the Ohio state lottery notified its customers about a "cybersecurity event." While confirming that its gaming system remains functional, the organization stated it had preemptively shut down certain crucial systems as a measure to control the situation [more]
Jobs
Position: Cyber Penetration Tester
Company: Peraton
Location: Arlington, VA, United States
Submit your application: http://tinyurl.com/mwbbyytu
Position: CyberSecurity Risk Management Specialist
Company: Intevity
Location: Arlington, VA, United States
Submit your application: http://tinyurl.com/3842wv4v
Position: Security Operations Center Engineer, Lead
Company: Booz Allen Hamilton
Location: Panama Cit, FL, United States
Submit your application: http://tinyurl.com/2ptytkhm
Position: Cloud Security Engineer - Hybrid
Company: XOR Security
Location: Washington, DC, United States
Submit your application: http://tinyurl.com/5bssva82
Position: Cybersecurity Consultant
Company: Singtel
Location: Singapore, Singapore
Submit your application: http://tinyurl.com/58wshpph
Position: Cyber Security Analyst
Company: ManTech
Location: Springfield, VA, United States
Submit your application: http://tinyurl.com/y65m45mw
Position: Cyber Security Analyst Senior
Company: ManTech
Location: Springfield, VA, United States
Submit your application: http://tinyurl.com/yc83hxdv
Wisdom Quote
“Angry people are not always wise.”
― Jane Austen