Using firewall to block Internet access

Context: Pakistani media outlets reported that the country is planning to implement a Chinese-style firewall to block users from accessing social media platforms. Even those using Virtual Private Networks (VPN) to access the Internet are likely to be hit by this firewall. 

Digital firewall

image 34
  • A digital firewall is a network security system that monitors and controls incoming and outgoing network traffic based on a set of predefined security rules. 
    • The security tools can stop online traffic from reaching certain sites. They can prevent malicious actors from targeting individual users’ computer systems or home networks, and even thwart cyber threats on specific websites.
    • Large firewalls (like the Great Firewall of China) can be used to prevent people from accessing large sections of the Internet i.e, websites, social media sites or information gathering platforms. 
  • Firewalls can be implemented as hardware devices, software running on a computer, or as a cloud-based service. 

How does a digital firewall work? 

  • Packet Inspection: The firewall examines each data packet (a unit of data transmitted over a network) that passes through it. It looks at the header information of the packet, which includes the source and destination IP addresses, port numbers, and protocol type (e.g., TCP, UDP).
  • Access Control Lists (ACLs): The firewall compares the packet information against a set of predefined rules known as an Access Control List. These rules specify which traffic is allowed to pass through the firewall and which traffic should be blocked.
  • Filtering Decisions: Based on the ACL rules, the firewall makes a decision on whether to allow the packet to pass through or to block it. 

Why is it used?

  • Firewall presents a viable alternative to authoritarian nation states who wish to replace a larger free Internet with a controlled intranet.
    • When used by nation-states, a firewall restricts activists, journalists, dissidents, and regime critics from obtaining information critical of the government. 
    • Internet shutdowns and social media blocks also prevent governments or military authorities from being held accountable during periods of civil unrest and violence.
  • However, setting up and maintaining a firewall is expensive. The firewalls require constant monitoring to thwart bad actors and fix security vulnerabilities.

Right to Internet in India: 

  • In the Anuradha Bhasin v/s Union of India 2020, the Supreme Court ruled that the right to freedom of speech and expression and the freedom to practise any profession or carry on any occupation, trade or business over the internet are protected under Article 19 (1) (a) and Article 19 (1) (g) of the Indian Constitution, respectively. 
  • This essentially means that the court recognised internet access as a fundamental right, integral to a democratic society for its proper functioning.

Practice Question: 

Q. Consider the following statements:

1. Firewalls can identify and block malicious software attempting to enter a network.

2. Firewalls primarily encrypt all data transmitted over the internet.

3. Firewalls are low maintenance and do not require constant monitoring.

How many of the statements given above are correct?

(a) Only one

(b) Only two

(c) All three

(d) None

Answer: (a) (Only statement 1 is correct)

Explanation:

  • Statement 1 is correct: Firewalls use packet inspection and access control lists to identify and block malicious traffic, including attempts by malware to enter the network.
  • Statement 2 is incorrect: Firewalls do not encrypt data transmitted over the internet. Their primary function is to control and filter network traffic based on predefined rules, not to encrypt the data itself. Encryption is typically handled by other security mechanisms.
  • Statement 3 is incorrect: Firewalls require ongoing maintenance and monitoring to ensure they are functioning correctly and to update their security rules as needed. Neglecting firewall maintenance can leave the network vulnerable to security threats.

UPSC PYQ 2022

Q. ​​With reference to Web 3.0, consider the following statements:

1. Web 3.0 technology enables people to control their own data.

2. In Web 3.0 world,  there   can be blockchain based social networks.

3. Web 3.0 is operated by users collectively rather than a corporation.

Which of the statements given above are correct?

(a)    1 and 2 only

(b)     2 and 3 only

(c)     1 and 3 only

(d)     1, 2 and 3

Answer: (d)

Share this with friends ->

Leave a Reply

Your email address will not be published. Required fields are marked *

The maximum upload file size: 20 MB. You can upload: image, document, archive. Drop files here

Discover more from Compass by Rau's IAS

Subscribe now to keep reading and get access to the full archive.

Continue reading