top of page
UAV_1_COMMAND.jpg

This is the space to introduce the team and what makes it special. Describe the team culture and work philosophy. To help site visitors connect with the team, add details about team members’ experience and skills.

Position / Role

Taylor Quill

Describe the team member here. Write a brief description of their role and responsibilities, or a short bio with a background summary.

Position / Role-Researcher/Trainer

Mahama Dauda

Mdauda_Editor_UAVs.jpg

Describe the team member here. Write a brief description of their role and responsibilities, or a short bio with a background summary.

Position / Role

Morgan James

Describe the team member here. Write a brief description of their role and responsibilities, or a short bio with a background summary.

Portfolio Activity – Introduction to Firewalls

Updated: Dec 7, 2025

Course: MSIT 5270 – Portfolio Activity


Abstract


Firewalls remain foundational in cybersecurity, serving as perimeter defenses and policy enforcement points across enterprise networks, cloud systems, and cyber-physical infrastructures. This paper presents a reflective yet academically structured analysis of firewall technologies, integrating scholarly literature, practical experience, and architectural models relevant to AI-driven cybersecurity and aerospace mission-critical environments. Using an IMRaD structure, the study examines firewall classifications, the evolution from packet filtering to Zero-Trust enforcement, and the role of firewalls as telemetry sources for AI/ML anomaly-detection pipelines. Enhanced citation density strengthens the results section, linking practical examples to academic and industry research. The paper concludes that modern firewalls are indispensable but can introduce operational risks if misconfigured, particularly in high-availability environments such as healthcare, aviation, and space systems.

                

Graphical Abstract



Introduction


Firewalls have served as the first line of defense in network security since the early stages of Internet development, evolving from simple packet filters to sophisticated, AI-enhanced security gateways (Cheswick et al., 1998). Their purpose extends beyond blocking unauthorized traffic. Contemporary firewalls enforce granular security policies, segment enterprise and cyber-physical networks, inspect encrypted traffic, and provide critical telemetry for threat intelligence systems (Maurushat, 2019). Libicki, Ablon, and Webb (2015) highlight the “defender’s dilemma,” arguing that defenders must secure every entry point while attackers need to succeed only once making robust perimeter and segmentation controls essential. This paper reflects on the importance of firewalls, synthesizes course readings with professional practice, and situates firewall concepts in the context of AI-augmented aerospace cybersecurity.


Methods


Three analytical methods guide this study:

  1. Review of Course and Academic Literature


    Sources covering firewall classifications, stateful inspection, Zero-Trust principles, and cybersecurity policies were evaluated. Literature addressing cybercrime management (Enigbokan & Ajayi, 2017), operational defense frameworks (Goss, 2017), and ethical cybersecurity decision-making (Bellaby, 2021) enriched the conceptual analysis.

  2. Synthesis of Professional Experience


    Real-world configurations involving corporate DMZ design, IoT segmentation, and VPN enforcement were integrated. Experience with FortiGate, Palo Alto Networks, Cisco ASA, AWS Network Firewall, pfSense, and industrial firewalls provided practical grounding.

  3. Architectural Visualization


    High-resolution diagrams designed by the author leveraging DIA and Microsoft built-in tools to illustrate firewall interactions with AI/ML detection engines, Zero-Trust enforcement, and HITL (human-in-the-loop) processes essential for cyber-physical and aerospace mission systems.


Results


Figure 1: Integrated Firewall–AI–HITL Security Architecture (Designed by Author, 2025)



This diagram illustrates multilayer defense incorporating traditional firewalls, AI/ML anomaly detection, Zero-Trust controls, UAV/IoT micro-zones, and HITL oversight. It demonstrates how perimeter and internal segmentation combine with AI-driven verification to protect cyber-physical assets, consistent with modern literature emphasizing multi-layered security (Goss, 2017; Erinle, 2016).


Why Firewalls Are Needed (Enhanced Citation Density)


1. Threat Prevention

Firewalls serve as the first gatekeepers blocking malware, unauthorized access, port scans, and C2 traffic (Goss, 2017). This aligns with research showing that perimeter defenses significantly reduce exposure to common cyber threats (Erinle, 2016).

2. Network Segmentation and Zero-Trust Enforcement

Modern networks rely on micro-segmentation to limit lateral movement, especially across IoT, ICS, and UAV systems. Zero-Trust networking (“Never Trust, Always Verify”) reinforces identity-based access by applying continuous authentication (Libicki et al., 2015).

3. Policy Enforcement and Traffic Control

Firewalls implement policy-driven access, enforcing which ports, protocols, and applications are permissible. This supports ethical, controlled, and auditable system behavior (Bellaby, 2021) and contributes to cybercrime reduction (Enigbokan & Ajayi, 2017).

4. Logging, Monitoring, and Compliance

Regulatory frameworks such as ISO 27001, GDPR, HIPAA, and NIST SP 800-53 require audit logs and bounded access to all functions strengthened by firewalls (Sacks & Li, 2018).

5. Secure Remote Access

Firewalls integrate VPN tunnels enabling encrypted communications for remote workforces critical in U.S. defense and aerospace operations (Goss, 2017).

6. Protection of Cyber-Physical Systems (CPS)

Firewalls in CPS/IoT networks mitigate botnets, spoofing, unauthorized AI/ML model access, and firmware manipulation (Erinle, 2016). Bowman (2015) uses "black hole firewalls" as a metaphor highlighting boundary protection in complex systems, supporting segmented system defense.

7. Examples of Firewall Technologies and Their Impacts

Palo Alto Networks NGFW

  • Application-aware filtering (Cheswick et al., 1998)

  • AI-based threat prevention (Goss, 2017)

  • Segmentation supporting hybrid IT/OT infrastructures (Erinle, 2016)

Fortinet FortiGate

  • ASIC-accelerated deep packet inspection

  • Integrated SD-WAN for distributed systems

  • IoT/UAV micro-zone enforcement (Libicki et al., 2015)

Cisco ASA/FirePOWER

  • Enterprise VPN backbone for remote aerospace operations

  • IPS, URL filtering, threat reputation feeds

  • Long-term operational reliability is emphasized in government-critical literature (Goss, 2017)

pfSense

  • Open-source IDS/IPS and VPN capabilities

  • Ideal for research labs and SMEs

  • Cost-effective alternative but lacking native AI threat intelligence (Enigbokan & Ajayi, 2017)

AWS Network Firewall

  • Scalable cloud-native Zero-Trust enforcement

  • Seamless telemetry integration into AI/ML detection loops

Industrial Firewalls (Siemens, Honeywell)

  • OT-protocol aware (e.g., Modbus, Profinet, UAV command channels)

  • Protect safety-critical environments in aerospace and power systems (Erinle, 2016)

Figure 2: Firewalls and Their Impacts in Modern Enterprise + CPS Security



The figure is a layered security stack depicting perimeter NGFW controls, identity-driven micro-segmentation, AI/ML-enhanced UEBA and SIEM/SOAR analytics, and downstream protection of internal cyber-physical system (CPS) assets.


Discussion:  Key Takeaways


  1. Firewalls remain vital even in AI-driven networks, functioning as control points for traffic filtering, segmentation, and policy enforcement.

  2. Stateful inspection provides essential context absent in basic packet filtering (Cheswick et al., 1998).

  3. NGFWs integrate IDS/IPS, SSL inspection, and AI-based prevention, offering broader protection against zero-day threats (Goss, 2017).

  4. Misconfigurations remain a primary weakness, reinforcing that complexity increases systemic risk (Libicki et al., 2015).

  5. Firewalls are indispensable in CPS and aerospace, particularly for IoT, UAVs, and telemetry-protected systems.


Relevance to My Career and Development


This topic is highly relevant to my career as a cyber-physical system, UAVs,  senior network engineer, and cybersecurity researcher requiring both technical and strategic planning. Firewalls serve as:

  • Segmentation tools for UAV/IoT/CPS infrastructures,

  • VPN gateways for global engineering teams,

  • telemetry sources for AI-driven anomaly detection, and

  • policy enforcement systems in GRC and compliance workflows.


Daily Professional Use: I configure firewalls for enterprise networks, cloud VPCs, and VPN gateways. Understanding rule bases, NAT, and segmentation is essential to avoiding downtime and breaches.


Cyber-Physical Security: My research in IoT and UAV security relies heavily on firewall-based micro-segmentation to defend against botnets and unauthorized device access.


AI-Driven Threat Detection: In my MSIT capstone, firewalls serve as upstream data sources feeding logs into AI/ML models for anomaly detection.


Leadership and Compliance: Firewall policy reviews are a core responsibility in governance, risk, and compliance (GRC) roles.


Future Research Preparation:  As I aim for doctoral research in AI-cybersecurity, understanding firewall behavior is foundational to designing zero-trust architectures.


Conclusion


Firewalls remain indispensable security components, linking policy enforcement, risk management, and technical defense within both enterprise and cyber-physical environments. Their role is magnified in modern Zero-Trust architectures, where identity-based and behavior-verified access rely on robust segmentation and telemetry collection. However, the study also highlights firewalls as potential sources of operational risk. Misconfiguration, untested updates, or overloaded inspection rules can inadvertently weaken availability, particularly in mission-critical environments such as healthcare and aerospace. As Sacks and Li (2018) show, regulatory compliance further elevates the need for precision and continuous monitoring. Ultimately, firewalls strengthen organizational posture when integrated within layered defenses, AI-enhanced monitoring, and rigorous configuration management.


References


Bellaby, R. W. (2021). An ethical framework for hacking operations. Ethical Theory and Moral Practice, 24(1), 231–255.

Bowman, B. (2015). BLACK HOLE FIREWALLS. Scientific American, 313(2), 6–6. https://www.jstor.org/stable/26046080


Cheswick, W., Bellovin, S. M., Ford, W., & Gosling, J. (1998). How Computer Security Works. Scientific American, 279(4), 106–109. http://www.jstor.org/stable/26057989

 

Enigbokan, O., & Ajayi, N. (2017). Managing Cybercrimes Through the Implementation of Security Measures. Journal of Information Warfare, 16(1), 112–129. https://www.jstor.org/stable/26502879


Erinle, B. (2016). Implementing a Cyber Security Plan. The Military Engineer, 108(702), 49–50. http://www.jstor.org/stable/26354642

 

Goss, D. D. (2017). Operationalizing cybersecurity—Framing efforts to secure U.S. information systems. The Cyber Defense Review, 2(2), 91–110.


Libicki, M. C., Ablon, L., & Webb, T. (2015). The Efficacy of Security Systems. In The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23–40). RAND Corporation. http://www.jstor.org/stable/10.7249/j.ctt15r3x78.11



Maurushat, A. (2019). Ethical hacking. University of Ottawa Press.


Sacks, S., & Li, M. K. (2018). How Chinese Cybersecurity Standards Impact Doing Business in China. Center for Strategic and International Studies (CSIS). http://www.jstor.org/stable/resrep22317

 



 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating*
bottom of page