Portfolio Activity – Introduction to Firewalls
- Mahama Dauda-ORCID: 2415-1949

- Dec 6, 2025
- 5 min read
Updated: Dec 7, 2025
Course: MSIT 5270 – Portfolio Activity
Abstract
Firewalls remain foundational in cybersecurity, serving as perimeter defenses and policy enforcement points across enterprise networks, cloud systems, and cyber-physical infrastructures. This paper presents a reflective yet academically structured analysis of firewall technologies, integrating scholarly literature, practical experience, and architectural models relevant to AI-driven cybersecurity and aerospace mission-critical environments. Using an IMRaD structure, the study examines firewall classifications, the evolution from packet filtering to Zero-Trust enforcement, and the role of firewalls as telemetry sources for AI/ML anomaly-detection pipelines. Enhanced citation density strengthens the results section, linking practical examples to academic and industry research. The paper concludes that modern firewalls are indispensable but can introduce operational risks if misconfigured, particularly in high-availability environments such as healthcare, aviation, and space systems.
Graphical Abstract

Introduction
Firewalls have served as the first line of defense in network security since the early stages of Internet development, evolving from simple packet filters to sophisticated, AI-enhanced security gateways (Cheswick et al., 1998). Their purpose extends beyond blocking unauthorized traffic. Contemporary firewalls enforce granular security policies, segment enterprise and cyber-physical networks, inspect encrypted traffic, and provide critical telemetry for threat intelligence systems (Maurushat, 2019). Libicki, Ablon, and Webb (2015) highlight the “defender’s dilemma,” arguing that defenders must secure every entry point while attackers need to succeed only once making robust perimeter and segmentation controls essential. This paper reflects on the importance of firewalls, synthesizes course readings with professional practice, and situates firewall concepts in the context of AI-augmented aerospace cybersecurity.
Methods
Three analytical methods guide this study:
Review of Course and Academic Literature
Sources covering firewall classifications, stateful inspection, Zero-Trust principles, and cybersecurity policies were evaluated. Literature addressing cybercrime management (Enigbokan & Ajayi, 2017), operational defense frameworks (Goss, 2017), and ethical cybersecurity decision-making (Bellaby, 2021) enriched the conceptual analysis.
Synthesis of Professional Experience
Real-world configurations involving corporate DMZ design, IoT segmentation, and VPN enforcement were integrated. Experience with FortiGate, Palo Alto Networks, Cisco ASA, AWS Network Firewall, pfSense, and industrial firewalls provided practical grounding.
Architectural Visualization
High-resolution diagrams designed by the author leveraging DIA and Microsoft built-in tools to illustrate firewall interactions with AI/ML detection engines, Zero-Trust enforcement, and HITL (human-in-the-loop) processes essential for cyber-physical and aerospace mission systems.
Results
Figure 1: Integrated Firewall–AI–HITL Security Architecture (Designed by Author, 2025)

This diagram illustrates multilayer defense incorporating traditional firewalls, AI/ML anomaly detection, Zero-Trust controls, UAV/IoT micro-zones, and HITL oversight. It demonstrates how perimeter and internal segmentation combine with AI-driven verification to protect cyber-physical assets, consistent with modern literature emphasizing multi-layered security (Goss, 2017; Erinle, 2016).
Why Firewalls Are Needed (Enhanced Citation Density)
1. Threat Prevention
Firewalls serve as the first gatekeepers blocking malware, unauthorized access, port scans, and C2 traffic (Goss, 2017). This aligns with research showing that perimeter defenses significantly reduce exposure to common cyber threats (Erinle, 2016).
2. Network Segmentation and Zero-Trust Enforcement
Modern networks rely on micro-segmentation to limit lateral movement, especially across IoT, ICS, and UAV systems. Zero-Trust networking (“Never Trust, Always Verify”) reinforces identity-based access by applying continuous authentication (Libicki et al., 2015).
3. Policy Enforcement and Traffic Control
Firewalls implement policy-driven access, enforcing which ports, protocols, and applications are permissible. This supports ethical, controlled, and auditable system behavior (Bellaby, 2021) and contributes to cybercrime reduction (Enigbokan & Ajayi, 2017).
4. Logging, Monitoring, and Compliance
Regulatory frameworks such as ISO 27001, GDPR, HIPAA, and NIST SP 800-53 require audit logs and bounded access to all functions strengthened by firewalls (Sacks & Li, 2018).
5. Secure Remote Access
Firewalls integrate VPN tunnels enabling encrypted communications for remote workforces critical in U.S. defense and aerospace operations (Goss, 2017).
6. Protection of Cyber-Physical Systems (CPS)
Firewalls in CPS/IoT networks mitigate botnets, spoofing, unauthorized AI/ML model access, and firmware manipulation (Erinle, 2016). Bowman (2015) uses "black hole firewalls" as a metaphor highlighting boundary protection in complex systems, supporting segmented system defense.
7. Examples of Firewall Technologies and Their Impacts
Palo Alto Networks NGFW
Application-aware filtering (Cheswick et al., 1998)
AI-based threat prevention (Goss, 2017)
Segmentation supporting hybrid IT/OT infrastructures (Erinle, 2016)
Fortinet FortiGate
ASIC-accelerated deep packet inspection
Integrated SD-WAN for distributed systems
IoT/UAV micro-zone enforcement (Libicki et al., 2015)
Cisco ASA/FirePOWER
Enterprise VPN backbone for remote aerospace operations
IPS, URL filtering, threat reputation feeds
Long-term operational reliability is emphasized in government-critical literature (Goss, 2017)
pfSense
Open-source IDS/IPS and VPN capabilities
Ideal for research labs and SMEs
Cost-effective alternative but lacking native AI threat intelligence (Enigbokan & Ajayi, 2017)
AWS Network Firewall
Scalable cloud-native Zero-Trust enforcement
Seamless telemetry integration into AI/ML detection loops
Industrial Firewalls (Siemens, Honeywell)
OT-protocol aware (e.g., Modbus, Profinet, UAV command channels)
Protect safety-critical environments in aerospace and power systems (Erinle, 2016)
Figure 2: Firewalls and Their Impacts in Modern Enterprise + CPS Security

The figure is a layered security stack depicting perimeter NGFW controls, identity-driven micro-segmentation, AI/ML-enhanced UEBA and SIEM/SOAR analytics, and downstream protection of internal cyber-physical system (CPS) assets.
Discussion: Key Takeaways
Firewalls remain vital even in AI-driven networks, functioning as control points for traffic filtering, segmentation, and policy enforcement.
Stateful inspection provides essential context absent in basic packet filtering (Cheswick et al., 1998).
NGFWs integrate IDS/IPS, SSL inspection, and AI-based prevention, offering broader protection against zero-day threats (Goss, 2017).
Misconfigurations remain a primary weakness, reinforcing that complexity increases systemic risk (Libicki et al., 2015).
Firewalls are indispensable in CPS and aerospace, particularly for IoT, UAVs, and telemetry-protected systems.
Relevance to My Career and Development
This topic is highly relevant to my career as a cyber-physical system, UAVs, senior network engineer, and cybersecurity researcher requiring both technical and strategic planning. Firewalls serve as:
Segmentation tools for UAV/IoT/CPS infrastructures,
VPN gateways for global engineering teams,
telemetry sources for AI-driven anomaly detection, and
policy enforcement systems in GRC and compliance workflows.
Daily Professional Use: I configure firewalls for enterprise networks, cloud VPCs, and VPN gateways. Understanding rule bases, NAT, and segmentation is essential to avoiding downtime and breaches.
Cyber-Physical Security: My research in IoT and UAV security relies heavily on firewall-based micro-segmentation to defend against botnets and unauthorized device access.
AI-Driven Threat Detection: In my MSIT capstone, firewalls serve as upstream data sources feeding logs into AI/ML models for anomaly detection.
Leadership and Compliance: Firewall policy reviews are a core responsibility in governance, risk, and compliance (GRC) roles.
Future Research Preparation: As I aim for doctoral research in AI-cybersecurity, understanding firewall behavior is foundational to designing zero-trust architectures.
Conclusion
Firewalls remain indispensable security components, linking policy enforcement, risk management, and technical defense within both enterprise and cyber-physical environments. Their role is magnified in modern Zero-Trust architectures, where identity-based and behavior-verified access rely on robust segmentation and telemetry collection. However, the study also highlights firewalls as potential sources of operational risk. Misconfiguration, untested updates, or overloaded inspection rules can inadvertently weaken availability, particularly in mission-critical environments such as healthcare and aerospace. As Sacks and Li (2018) show, regulatory compliance further elevates the need for precision and continuous monitoring. Ultimately, firewalls strengthen organizational posture when integrated within layered defenses, AI-enhanced monitoring, and rigorous configuration management.
References
Bellaby, R. W. (2021). An ethical framework for hacking operations. Ethical Theory and Moral Practice, 24(1), 231–255.
Bowman, B. (2015). BLACK HOLE FIREWALLS. Scientific American, 313(2), 6–6. https://www.jstor.org/stable/26046080
Cheswick, W., Bellovin, S. M., Ford, W., & Gosling, J. (1998). How Computer Security Works. Scientific American, 279(4), 106–109. http://www.jstor.org/stable/26057989
Enigbokan, O., & Ajayi, N. (2017). Managing Cybercrimes Through the Implementation of Security Measures. Journal of Information Warfare, 16(1), 112–129. https://www.jstor.org/stable/26502879
Erinle, B. (2016). Implementing a Cyber Security Plan. The Military Engineer, 108(702), 49–50. http://www.jstor.org/stable/26354642
Goss, D. D. (2017). Operationalizing cybersecurity—Framing efforts to secure U.S. information systems. The Cyber Defense Review, 2(2), 91–110.
Libicki, M. C., Ablon, L., & Webb, T. (2015). The Efficacy of Security Systems. In The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23–40). RAND Corporation. http://www.jstor.org/stable/10.7249/j.ctt15r3x78.11
Maurushat, A. (2019). Ethical hacking. University of Ottawa Press.
Sacks, S., & Li, M. K. (2018). How Chinese Cybersecurity Standards Impact Doing Business in China. Center for Strategic and International Studies (CSIS). http://www.jstor.org/stable/resrep22317







Comments