You are on page 1of 3

Firewalls and Encryption

1
Firewalls and Encryption

A firewall is a systems tool that forms part of its security strategy. It is a device or
software designed to act as a verification point between a stand-alone computer or
network and the worldwide web or internet. A firewall protection therefore operates by
checking any form of data that is incoming or outgoing from a network or computer
device. In knowing what to permit or block, firewalls utilize security filters which data
must conform to certain strict rules set to verify the authenticity and security of it. While
firewall protection is an integral part of a computers or systems security, there are
threats it cannot effectively guard against. Encryption protection on the other hand is the
transfer of electronic information into a different form, usually referred to as ciphertexting, which, is not easily comprehended by unauthorized parties. Unlike firewall
protection which involves itself with incoming and outgoing data, encryption protection
has the primary role of protecting the confidentiality of stored digital data systems or
networks. To do so, algorithms are usually utilized as a form of security assurance within
IT communications and systems (Taylor, Fritsch, Liederbach, & Holt, 2011).
Given the nature of threat that encounters digital information, the type of
protection that I believe is the most vital would be encryption protection. This is because
in this case, what we are attempting to secure here is the actual information being already
transmitted via a computer and internet network. I also do not feel that the utilization of
encryption is as widespread as it ought to be. The nature of encryption software is that is
aids the user to scramble any digital data being sent via the internet or computer network,
and in this process, protect and secure any content of stored emails, files, online

Firewalls and Encryption


transmissions and online communications. As such, the ultimate protection of electronic
privacy can be said to be hedged upon encryption (Taylor, et al, 2011).

Firewalls and Encryption

3
Reference

Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital crime and digital
terrorism (2nd ed.). Upper Saddle River, NJ: Pearson.

You might also like