Firewalls, IDS & IPS
Firewalls
A firewall is a network security device that monitors and controls incoming/outgoing network traffic based on predetermined security rules. It creates a barrier between trusted internal networks and untrusted external networks.
Demilitarized Zone (DMZ)
A DMZ is a perimeter network that separates the internal LAN from the external internet. Public-facing servers (web, email, DNS) are placed in the DMZ — accessible from outside but isolated from internal systems.
Intrusion Detection System (IDS)
Monitors network/system activity for malicious events and generates alerts (passive — detects but does not block).
- NIDS (Network-based) — Monitors traffic on a network segment (e.g., Snort, Suricata)
- HIDS (Host-based) — Monitors a specific device (e.g., OSSEC, Wazuh)
- Signature-based — Matches known attack patterns (fast, but misses zero-days)
- Anomaly-based — Detects deviations from baseline behavior (catches zero-days, more false positives)
Intrusion Prevention System (IPS)
An IPS goes further than IDS — it can actively block or drop malicious traffic in real-time. Inline deployment means all traffic passes through the IPS.
⚠️ IDS vs IPS
IDS = Burglar alarm (alerts you when someone breaks in)
IPS = Electric fence (stops the intruder at the perimeter)
SIEM — Security Information & Event Management
SIEM aggregates log data from across the entire IT infrastructure, correlates events, and generates alerts. Modern SIEMs use AI/ML for threat detection.
- Products: Splunk, IBM QRadar, Microsoft Sentinel, ELK Stack
- Key function: Centralized logging + real-time analysis + compliance reporting