Free Essay

Fire Fire

In:

Submitted By hrrbrm
Words 3446
Pages 14
FIRE, FIRE,

Abstract
Implementing a firewall is seldom a simple task. It must be carefully planned in order to meet all of the needs of a companies complicated network design. The design objectives depend on what problems are anticipated, what services to allow or deny, and what level of risk is acceptable. How to cover these objectives is a lot to consider; how much money is available or allowed in order to implement this design, how long does the administrator have to complete this design, and is the expertise level of knowledge available in order to correctly implement this design? The most daunting task of all; which firewall to implement? A firewall comes in all shapes, sizes, and specification. All are meant to make a network more secure, but where to start? Is it a software driven firewall or hardware bases firewall used? Which type of firewall; database, network based, host bases, or application bases? What are the differences between them, how they work or what they actually do? Will it do more harm than good? It can all be very confusing when trying to protect a network and figure out which firewall is best fit. All of these are very important questions that should be answered before starting the installation and implementation of a firewall. Hopefully the answer to these questions will become clear as firewalls are discussed further in this paper.

Firewalls What is a firewall and how does it work? By definition a firewall protects an internal network from malicious access from the outside. A firewall basically comes in two different styles, hardware or software based. A software based firewall is just that, software that is installed on another piece of equipment in order to provide the functionality of a firewall. Hardware based firewall is an ancillary piece of equipment whose sole purpose it to work as a firewall. The most secure configuration would be a combination of both on your network. Packet filtering and stateful packet inspection are among the various types of firewall methods that are implemented. Typically firewalls are placed at the perimeter of the network or between segments; they are the defenders of the perimeter wall against possible attacks. Other options will be discussed as well; network layer firewalls, also referred to as packet filter firewalls, stateful inspection firewalls, and application layer firewalls. Firewalls can be configured many different ways, dependant on the type of firewall that you are utilizing. They basically use a form of access control in order to deny or allow traffic. They can allow traffic based on the service, the Internet Protocol (IP) address of the source or destination, or the ID of the user requesting service. One of the benefits to a firewall is that you can also configure logging for all traffic. A software firewall is usually installed on an individual personal computer. This type of firewall works on a per-packet and a per-process filter. Since a software firewall is running on a computer, it is capable of knowing more about the network traffic than just what port it is using. It will know what program is accessing the Internet and if it is malicious or not. Dependant on the information that is set in the filter, a software firewall can allow or block a program’s ability to sent or receive data. The filter can also be set to prompt the user to confirm or deny traffic before it is allowed to access the Internet. Using a software firewall is an extra layer of firewall protection; it is not beneficial to an entire network since it protects only the computer it is loaded on. Hardware firewalls are typically a stand alone product. They can be effective with little or not configuration. They can normally be configured with little or minimal knowledge and protect a network. A hardware firewall is normally more secure since it is not using a regular operating system. Operating systems have complex code that could become a vulnerability to a firewall if it is not properly patched. Anything that is vulnerable can be exploited, and that exploitation can compromise the system.
Data Base firewall A data base firewall is a hardware apparatus or software that is installed on a server to protect against database specific attacks. They may have a pre-set dictionary of signatures, which are updated by the vendor when attacks are identified. A database firewall can identify vulnerabilities identified in the operating system or protocols and notify an administrator for patch management if properly configured. Policies and rules can be set that will monitor for irregular activities which could prevent possible hacking. In an article by ExcITingIP.com (2011) two of the most common attacks to a database are SQL injection and Buffer Overflows, these are prevented with the use of exception policies to support patching and policy that can assess everything from time of day and IP address to verification of user.
Application firewall An application firewall is a device placed between the network firewall and the host that runs the web-based application. It monitors the web application accesses collecting valid application requests. It can block all requests that do not qualify as a valid request according to its rule base. There are two types, inline and passive. Inline has all traffic flow through it; this can be risky if there is a hardware failure. Inline is also considered an active firewall and will drop any requests that are perceived to be an attack (Eubanks, 2005). Passive will log the information but will not block any request that violates the rule set. An application firewall should be able to react appropriately, as defined by the policy or rules set, to threats against identified vulnerabilities. Be able to inspect and respond, either allow, block, or notify, based on the rules set. It should also be able to work on “white lists” or “black lists”. A white list defines acceptable data or behavior, where a black list defines what is not allowed. There are many parameters that can be defined within the “lists” and careful consideration needs to be adhered to in order to prevent exposing applications to potential hazards on the Internet (PCI Security Standards Council, 2008).
Network Based firewall Network firewalls protect an entire network by guarding the perimeter. The firewall is put directly in line with all information coming into or leaving a network. It inspects all traffic for malicious content and must make a decision on whether to let the data access the internal network or drop it. This could be as simple as a border router using packet filtering or a separate piece of hardware that receives the data from the router prior to the data entering the internal network. A major problem that can occur with this type of firewall is that all data must pass through this single interface. This becomes a possible single point of failure within a network, if it fails your network is down until repair or replacement can be accomplished.
Host Based firewall Host-based firewalls are software firewalls installed on individual systems. They usually offer features beyond a typical firewall, such as spyware, virus scan software, and pop up blockers. Host-based firewalls can be run on individual desk tops or laptops. Some companies have users that telecommute either from their home or possible from a hotel. Having a host-based firewall helps protect the user from incidents and also prevent the spread of infections. Host-based firewalls can be used as an addition layer of defense. They protect the host that they are installed on, but will also defend against a compromised system being used to attack other systems as stated by Northcutt, Zeltser, Winters, Frederick, & Ritchey (2003) . They can also detect insider threats, when an employee is involved in a hacking attempt on the inside of a system.
Firewall Types
Packet Filter A packet filter is used to instruct a firewall to drop any traffic that meets a certain criteria. This type of firewall examines the header of a packet to determine its source and destination addresses. This is done at the Network layer of the OSI model which is directly compared to the Internet layer of the TCP/IP layer. It is then compared to a predefined or user created set of rules that determine whether the packet is safe or not. The object is to look for malformed or suspicious packets and decide whether or not if each packet should be allowed in the protocol stack. If it is deemed safe then it is allowed; if not, it is denied. There are several TCP/IP attributes used when implementing packet filtering rules. You can use source and destination IP addresses, IP protocols, source and destination TCP and UDP ports, and the interfaces of the packets arrival or destination (Scarfone & Hoffman, 2009).
Stateful Packet Inspection This type of Firewall looks at additional characteristics such as a packet’s origin and whether it is a response to a request or unsolicited acknowledgement. When we look at a connection setup sequence, the first packet that is expected is a SYN packet. When the firewall sees this packet it places the connection in the SYN state. When in this state, only two possibilities exist for the next packet; a SYN ACK packet (acknowledging the packet), or an RST packet (resetting the connection). If any other packet is provided the firewall will deny it since it is not what the firewall is expecting. One of the benefits of a packet filter firewall is that they can handle larger amounts of traffic at a faster rate since they do not have the overhead of extra processing that is required with application firewalls. Stateful firewalls monitor the connection processes according to Dubrawsky (2010); they do not look any further up the protocol stack. A combination of stateful and application firewall, known as a deep packet firewall, is capable of not only monitoring the connection but also monitoring higher level protocols for abnormalities.
Application-Layer
This type of Firewall is also known as a proxy firewall and works like a mediator. Since all connections begin and end on the firewall, the internal network can not be seen by the outside world. All internal addressing schemes are hidden behind the firewall. Policies are enforced through the use of proxies and each protocol must have its own proxy. A benefit of this type of firewall is that it is difficult to hide traffic inside other services. “With an application gateway, first the client application is checked to see if access should be granted, and then the users are authenticated” (Easttom, 2006). There are some drawbacks to using an application-layer firewall. Since it is “full packet awareness” the firewall uses more resources comprehending and clarifying each packet. They tend to be unsuited to high-bandwidth applications. “An individual, application specific agent is required for each type of network traffic that needs to transit a firewall” (Scarfone &Hoffman, 2009). Because of this, they do not support new applications.
Circuit-level Gateways Circuit level gateways set up a virtual circuit between the internal client and a proxy. It validates the user first, then the connections, before allowing data to be exchanged. It operates at the transport layer of the OSI and will only permit traffic transfer if it determines the connection between both ends is valid according to the rule set. It has some characteristics of a proxy server since the external network never sees the internal network, but also similar to a packet filter in that it makes access decisions based on IP address, protocol, and port information. Harris (2010) states it may not provide the detailed access control of an application layer firewall but it does provide security for a wider range of protocols.
Bastion Host A bastion host is usually a highly exposed device that is outward facing on the Internet. It is used as a first line of defense and is locked down and hardened to protect the internal network. In order to make it as secure as possible it should have only the required services running, all ports that are not absolutely required to be open should be shut, and all unnecessary or inactive user accounts should be disabled.
Defense in Depth (DiD) Defense in Depth is more than just computer system security. It is all of the methods, techniques, tools, people and processes needed to protect that network. A layered security mechanism increases the security of the system as a whole. When an attack gets by one system, another system in standing by to hinder or deter that attack. Some tools, though not specifically considered firewalls, fall into a firewall like capacity. De-militarized Zones (DMZs), and Access Control Lists (ACLs) are such tools (Northcutt et al, 2003).
Demilitarized Zone (DMZ) Most computers run behind a firewall, one or more will run outside of the firewall in what is called the DMZ. The computers in the DMZ intercept traffic and broker requests similar to a proxy server. All outbound requests are sent to the DMZ on behalf of the internal network, all incoming requests must first pass through the DMZ before reaching the firewall. This offers an added layer of protection to the network prior to the firewall according to Maiwald (2004). The systems that are placed in a DMZ are accessed from an external network and can also be accessed from the internal network, but they never allow the external network access the internal network. These systems are Web servers, and External Domain Name Server (DNS). The services that are in the DMZ are not fully trusted so remain on the outside of the trusted network.
Access Control Lists (ACL) You can configure an access control list to prevent certain traffic from entering or exiting a network. This is usually done on a router as part of a security solution. ACLs filter network traffic by controlling whether packets are forwarded or blocked at the interface. ACL list are scanned for a match one line at a time from top to bottom, for a pattern that matches the incoming packet. A permit or deny rule is associated with the list to determine the fate of the packet. Access lists can be applied to inbound or outbound traffic depending on the interface they are associated with. All unmatched packets are normally dropped by default, it is a good habit to end all list with a ‘deny all’ statement. Access lists are a good way to do packet filtering, remember though that they cannot adapt to changing network or security needs. Harris (2010) suggest it is not a true firewall, just another layer of security to help protect your network.
Firewall issues It is easy to make a mistake in configuring complex firewalls. Many of them come with security holes which conscientious administrators must find and close. Software Firewalls run on top of other devices, you have to contend with an operating system that could have vulnerabilities as well as any potential vulnerability in the firewall. Hardware firewalls have less OS vulnerabilities, but vulnerabilities are still there. An attacker has many techniques that can be used to bypass a firewall; he only needs to find one vulnerability to succeed where an administrator has to find all of the vulnerabilities and close them to keep an attacker out.
Firewalking
Firewalking is a process of using the Traceroute Time to Live (TTL) feature to map your network by using the TTL exceeded in transit message. It attempts to determine which protocols a firewall will block and which they will pass on to downstream hosts. By scanning the ports on a firewall you can map which ports are open and passing traffic. By doing this you can map your way through a firewall. According to David Irby “One of the greatest threats posed by firewalking scan is that most firewalls do not log traffic on allowed ports” (Irby, 2005). Because of this, a potential hacker does not leave any traces of their scans in the system logs. Based on the results of Firewalk scans, a hacker can identify which ports are open. Firewalking can be used by both the attacker and the administrator.
NMAP
NMAP is another resource for administrators and hackers alike. It is an open source tool that can be used by an administrator to verify the security posture of a network; it can also be used by a hacker to probe a network for possible attack. You can use NMAP to penetrate firewalls, and determine which ports a firewall will allow through. Firewalls are designed to prevent attacks, NMAP includes a number of features designed to circumvent a firewalls defenses. Scanning a target using packet fragmentation, idle zombie scan, or randomize target scan order are just a few of the options available. According to Lyon (2008) NMAP not only can detect open ports, it can detect which services are running and their version number. The scans can also be altered to prevent the firewall from detecting the NMAP scans. NMAP can be a useful tool to an administrator. If properly utilized it can reveal vulnerabilities in the network; this can afford the administrator the option of securing the network before a hacker used the same tools against them.
Summary
Understanding the capabilities of each type of firewall and designing your network with those capabilities in mind will be beneficial in protecting a network system. “A firewall is a network access control device that is designed to deny all traffic except that which is explicitly allowed” (Maiwald, 2004). As technology continues to change the capability to provide more robust and dynamic protection to the network will only increase. Developing a policy or rule set for your network that meets the needs of the users while protecting the data from malicious users or malware is the ultimate goal. An important part of building a firewall is knowing how your network is laid out and how networking works in general. The best defense against attacks is a well configured firewall. The cardinal rule is “deny by default”. If an administrator tries to allow everything and then tries to block just the malicious traffic, it may be too late when he determines something is malicious. Instead of trying to block just the malicious traffic, block everything. The user will notify the administrator on what traffic is necessary. A firewall is purposely put in a position to inspect and filter every packet that comes into the network. By default, latency in network performance is incurred by this process. Every effort should be made in order to minimize the latency while affording the best protection of the data is essential to any network architecture.

References
Dubrawsky, I. (2010, November 02). Firewall Evolution – Deep Packet Inspection. Retrieved from http://www.symantec.com/connect/articles/firewall-evolution-deep-packet-inspection.
Easttom, C. (2006). Network Defense and Countermeasures: Principles and Practices. Upper Saddle River, NJ: Pearson Education, Inc.
Eubanks, R. (2000). Application Firewalls: Don’t Forget About Layer 7. Retrieved from http://www.sans.org/reading_room/whitepapers/application/application-firewalls-forget-about-layer-7_1632.
ExcITingIP.com. (2011, May 26). What are Database Firewalls, why are they required & how do they protect databases? Retrieved from http://www.excitingip.com/1933/what-are-database-firewalls-why-are-they-required-how-do-they-protect-databases/.
Firewall Security Technical Implementation Guide – Cisco V8R6. (2011, April 29).
Harris, S. (2010). CISSP All-in-One Exam Guide, Fifth Edition. New York, NY: McGraw-Hill.
Irby, D. (2005). Firewalk: Can Attackers See Through Your Firewall? Retrieved from http://www.giac.org/paper/gsec/312/firewalk-attackers-firewall/100588 .
Lugo, I. G. & Parker, D. (2010, November 10). Software Firewalls: Made of Straw Part 1 of 2 Retrieved from http://www.symantec.com/connect/articles/software-firewalls-made-straw-part-1-2
Lyon, G. (2008). NMAP Network Scanning. Sunnyvale, CA: Insecure.Com LLC
Maiwald, E. (2004). Fundamentals of Network Security. Burr Ridge, IL: McGraw-Hill.
Northcutt, S., Zeltser, L., Winters, S., Frederick, K. K., & Ritchey, R. W. (2003, July). Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. Indianapolis, IN: New Rider Publishing.
Pacchiano, R. (2011, June 09). Firewall Debate: Hardware vs. Software. Retrieved from http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3103431_/Firewall-Debate-Hardware-vs-Software.htm.
PCI Security Standards Council. (2008, October). Information Supplement: Application Reviews and Web Application Firewalls Clarified. Retrieved from https://www.pcisecuritystandards.org/pdfs/infosupp_6_6_applicationfirewalls_codereviews.pdf.
Scarfone, K. & Hoffman, P. (2009, September). Guidelines on Firewalls and Firewall Policy. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdf.

Similar Documents

Free Essay

Fire

...to be facing. During those five precious minutes, someone's house is a blaze with fire. It is your duty to put that fire out, preserve as much as possible, and protect life. Do you think you could handle so much responsibility, pressure, and risk? I know I could. It is a dream of mine to become a firefighter in all sense of the word. I enjoy the thought of risk taking and even helping people, which is why I think that this profession would be just right for me. Ever since I was about 11 years old, and my house had caught fire, had I wanted to be a firefighter. Just watching all of those skilled firefighters mesmerized me. They had such precision and knew exactly what to do in what seemed every situation that would be thrown at them. I feel as though this is their personality and traits added to this accuracy at being so good at what they do. I also have quick reflexes, good stamina, and I tend to think of myself as a fast and logical thinking, just as they all were. I chose this career not only for my liking to it, but also because of the growth in the profession. Firefighting is a field that has potential for growth in the coming years, the education, requirements, and dedication are all equally important to this extremely dangerous, yet exciting job. Firefighting is one of the most dangerous jobs out in the occupation world today. Summed up as a whole, firefighters are trained to fight fires, rescue people in need and provide medical services for humans and animals. There are...

Words: 750 - Pages: 3

Premium Essay

Fire Def.

...ether, Methyl alcohol, Acetone.

9. Combustible Metals (provide examples): a metal that will combust under heat. Some examples are: Calcium, Magnesium, Sodium.

10. Carboxyhemoglobin: A compound found in the blood by binding carbon monoxide and hemoglobin.

11. Chemical Energy (provide examples of the two types): Energy stored in the bonds of chemical compounds released or taken in during exothermic and endothermic reactions. An example of an exothermic reaction is a fire burning. An example of an endothermic reaction is photosynthesis.
 
12. Concentration: the relative amount of a given substance contained within a solution or in a particular volume of space.

13. BTU: British thermal unit which is a traditional work equal to 1055 joules.

14. Joule: the SI unit of Work or Energy.

15. Fire: Combustion or burning in which substances combined chemically with oxygen in the air and typically give out bright light heat and smoke.

16. Fire Point: The lowest temperature at which a substance can continue to burn.

17. Fire Tetrahedron: A four-sided geometric...

Words: 992 - Pages: 4

Free Essay

Fire Scienc

...The word fire is defined by webster as the phenomenon of combustion manifested in light, flame, and heat. What this definiton does not tell you is how dangerous a fire can be if you are not aware of its capability to spread and grow rapidly. Fires can be very dangerous and harmful. It is important to education each other as much as possibe to help prevent injries or deadly accidents. There are four stages that happen in every fire. Those stages are Incipient, Growth, Fully Developed, and Decay. Each stage plays a role in every fire. Understanding each stage, and how to handle or prevent it is critical in becoming in control of a fire. Flameovers and backdrafts are not consider stages, but also are definitely factors of a fire. These factors sometimes can be prevented. Some methods of prevention are taugh at fire academies, or fire schools, to new firefighters, and are constistly being developed. Incipient, also know as the "ignition" stage, is the first stage of a fire. In this stage smoke may began before the fire actually flames up. This is the stage where heat, oxygen, and a fuel source combine to ignite the fire. At this stage it can be controlled by a household fire extinguinsher. Growth is the second stage of a fire. With the initial flame used as a heat sourse, more flames flare up. Flaring up makes the size of the fire increase and the plume reaches the ceiling. In a room hot gases meet at the celing of the roomwhich cause all fuels in that room...

Words: 564 - Pages: 3

Free Essay

Fire

...http://www.firefighterclosecalls.com/news/fullstory/newsid/204329 Research Articles Two Albuquerque firefighters responded to a arson fire when one fell through the floor of the home. He said that upon arriving on scene they noted flames coming from the second story of the home and proceeded to engage the fire on the second story after making entry. firefighter Andes reports that he took one step onto the second floor when it started to give way but his partner Lt. Lang reached out and grabbed his strap to save him. This article demonstrates why it is important for fire fighters to always work in teams as well as why it is also vital to always check for floor stability before proceeding onto a fire floor on any multistory structure. http://www.firefighterclosecalls.com/news/fullstory/newsid/204186 In this article a tanker from a volunteer department in Readington New Jersey was overturned injuring a 54 year old veteran volunteer firefighter as well as a deputy chief. It does not state if they where responding to a call or not but does say that this is the second time in which this department has wrecked a fire truck in the last month. Both men where medevac'd from the scene with reported head injures. This is a prime example of why it is vital to drive safely and know what your different apparatuses are capable of. Tankers are always a risk due to water surge and should be handled with this in mind. Better to drive slower and get to the scene safely than to push...

Words: 395 - Pages: 2

Premium Essay

Fire Warden: What Is Covered In Fire Warden Training

...A fire warden is a vital part of ensuring your organisation is prepared in case of an emergency. Fire warden training is essential so the warden learns how to act in an emergency, implements or improves existing emergency procedures and how to lead evacuation and fire drills properly. What is Fire Warden Training? Fire warden training is specific courses designed to teach an individual how to act and respond per their duties as a fire warden. Some of the duties include assisting in creating or enhancing current evacuation procedures in the workplace, preventing fire emergencies by monitoring risk factors, raising awareness of any potential fire hazards in the workplace, teaching staff members appropriate behavior during an emergency and executing fire and other emergency drills. A fire warden is also responsible for teaching staff members about various emergency situations, ensuring all workers are accounted for during an emergency event and assisting any staff members in evacuation if they need the help. What is Covered in Fire Warden Training?...

Words: 518 - Pages: 3

Free Essay

Fire Prevention

...Fire Fire is the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat, light, and various reaction products. Fire in its most common form can result in conflagration, which has the potential to cause physical damage through burning. Fire is an important process that affects ecological systems across the globe. The positive effects of fire include stimulating growth and maintaining various ecological systems. Fire has been used by humans for cooking, generating heat, signaling, and propulsion purposes. The negative effects of fire include water contamination, soil erosion, atmospheric pollution and hazard to human and animal life. PHASES OF A FIRE First Phase – Incipient Oxygen content 20% - 21% with ceiling temperatures of approximately 37˚ C°. At this stage the produces of combustion are water vapour, carbon dioxide and sulphur dioxiode, and hot gases rising. Smoldering fires my last for a few seconds to several hours before breaking into flames. A large volume of smoke will be present until flaming starts and then progress is rapid. Second Phase – free burning, flame producing or steady state At this stage the oxygen content is 15% - 19% and the ceiling temperatures are above 537°C and the products of combustion are water vapour, carbon dixiode, carbon monoxide and sulphur dioxide. There large quantities of dark grey smoke and rapid destruction of combustible materials. It is at this point that flash over occurs. Flash...

Words: 3488 - Pages: 14

Premium Essay

Monologue About Fire

...years is what they’ve predicted. Sure, when the days are 45 or higher in the mercury, then we’re all a little on edge. But when is the last time we’ve had high winds, low humidity and high temperatures? All in one day? It’s been years I reckon. Years since the perfect conditions. In the service we call this… a ‘crossover’. Happens rarely but when it does… yeesh. All the old blokes tell us about when they’ve had crossovers. You mention the word crossover to any firefighter and they will have a wealth of stories about fires with a hundred metre flame heights, flames running faster then you can sprint, the immense heat, and the sheer terror. Terror that gives seasoned firefighters nightmares. I’ve never witnessed a crossover before, unfortunately I joined a few years after Red Friday, the last known crossover to occur during a bushfire season. A few of the officers were at that fire; they’ve all left the brigade now. The officers will have lots to tell us about crossover fires, we just shrub them off, “yeah yeah”, we say, don’t worry, we’ve done our training. We’re prepared. All these old farts go on and on about this all the time, even though the boys, Jason and I included, are a bit young, we can handle it. A brigade full of young, fit and enthusiastic volunteers. Aged from 17 to 30, and then you got the few high officers that have been in the brigade 30 or 40 odd years. Although we haven’t seen a big season before, that doesn’t mean we can’t handle it. * * * Five weeks is how much...

Words: 1995 - Pages: 8

Premium Essay

Essay On Fire Accident

...Accidents happen when we least expect them. When your premises catches fire, it can be one of the most traumatizing moments in your life. A fire accident on any property is a recipe for disaster. It pinches hard to see your favorite things blazed in the fire. Sometimes the damage is so severe that you cannot be in a position to salvage anything. Remember that at that time, you are normally in shock and confused on what to do next. If you find yourself in that situation, it is advisable that you seek the services of a professional to come and do fire damage restoration. This undertaking is very important to you as a property owner because it will go a long way in restoring your premises to a condition that is fit for human habitation. The following...

Words: 711 - Pages: 3

Free Essay

Fire

...Why people don't respond to alarm signals People often fail to respond quickly to fire alarm signals. A common example: In a hotel, a fire alarm sounds late at night. Only a handful of people actually dress and leave (often using the elevators). A few people call the front desk. Many people periodically poke their heads out their doors to see what's going on. But mostly, people simply wait for the alarm signal to stop. Eventually, the alarm either shuts off, or someone (hopefully) comes to tell them that there is a real emergency and they must leave. This problem has aggravated and perplexed fire safety professionals over the years. Some denounce the public for their stupidity in failing to recognize the potential danger indicated by a fire alarm signal. Their concern is valid: in many fire emergencies, a rapid response is critical to survival. But attributing the problem to public stupidity is inaccurate and of no value in correcting the problem. In reality, people are simply exhibiting natural tendencies. Why don't people respond to alarm systems? There are several reasons. In this essay, these reasons are divided into two main categories: Alarm signals as sources of information. Other reasons why people do and don't respond apart from the information-value of alarm signals. Alarm signals as a source of information. In order to understand why people fail to respond to alarm signals, we need to look at the information-value of alarm signals. By information-value...

Words: 1477 - Pages: 6

Premium Essay

Fire

...statements about natural gas is MOST accurate? (778) Your Answer: | In its pure form is methane, which is flammable and toxic. | | Correct Answer: | In its pure form is methane, which is flammable but nontoxic. | | Where is natural gas used? (778) Your Answer: | Commercial facilities only | | Correct Answer: | Houses, businesses, and as a fuel for motor vehicles | | The techniques of approaching and controlling leaks or fires involving vehicles: (778) Your Answer: | are different than those for storage vessels. | | Correct Answer: | are the same as for storage vessels. | | Which of the following is the method most often used for controlling flammable liquid fires? (774) Your Answer: | Applying dry chemicals | | Correct Answer: | Applying foam | | Which of the following is NOT a main use for a master stream? (769) Your Answer: | As a backup handline | | Correct Answer: | Indirect fire attack | | Which of the following types of fire extinguishers should be used to extinguish fires in transformers at ground level? (782) Your Answer: | Stored-pressure water extinguisher | | Correct Answer: | Carbon dioxide extinguisher | | Which of the following is generally the first task of the second-arriving engine company? (789) Your Answer: | Assists with fireground support company operations | | Correct Answer: | Backs up the initial attack line. | | Once...

Words: 412 - Pages: 2

Premium Essay

Fire

...When we all started our carrers as firefighters wheatear we knew it or not we were all at the mercey of those more experienced at the station. While this typically what you would expect to see at the fire station it can definatily be a double edged sord. While rookie firefighters get the opputunity to be guided in the right the direction by the more seasoned firefighters the opposite is also true, and can lead the rookie down the wrong path. This can be attributed to a lot of reasons including: the seasoned firefighter has been taught the wrong path themselves, they may not have the patentece to guide a rookieor are have poor teaching skills, and of course they may just not care. Barring the last example(because we all know we work at a good station) the other examples can be detrimental to the new firefighter succeeding. A lot of what we do in the fire service can only be perfected through experience. Tring new ways to accomplish a small task is the firefighter way. Much of the basics of what we do in the fire service is learned at a fire school but is taught as general information with the understanding that each induvudal department, station and shft have their own way to handle fireground activities. This is a completely acceptable practice, it is part of the captains job to gage their crews skills abilities as well as have an understanding of their still alarm territory and target hazards. When a rookie firefighter first comes to the station sometimes it is easy to...

Words: 482 - Pages: 2

Premium Essay

Fire Prevention

...Fire Prevention: Prepared or Not Eric Brown Kaplan University Fire Prevention Practices FS-105 09 Prof. Chipper Wilkerson 9/30/13 Abstract Does fire prevention need to be taught before you get formal education to put out the fire? Once you know how and why it started can that make a difference in how you go about teaching fire prevention or even to put out the fire. This is a different way to think about fire prevention that has to be looked into to find out if this is a better way. Engineering, Education and Enforcement have worked for now maybe it’s time to change the The Three E’s around and make education the most important. The Job of Fire Prevention The implementation of the fire bureau has led to better enforcement of life safety codes and inspections to help prevent fires from happening. There have been many instances in history that show how fire prevention could have saved lives. What has to be done to reinvent the idea of fire prevention? How many fire departments do fire prevention every day, my guess would be not many. Fire prevention should be taught every week not just during fire prevention week for the idea to help prevent fires from happening. The U.S. population has the mentality that fires only happen to others and not me and if it does I am insured attitude(Hensler, 2011). Some firefighters receive their training on fire prevention on the job, but does that mean they are being taught by someone who has had formal training or was...

Words: 961 - Pages: 4

Premium Essay

Wildland Fire Research Paper

...Explain the fire principals of wildland fires. And how their behavior differs from structure fires. The basic fire principals consist of five principals that go into fire behavior. Principal one is the fire triangle or Tetrahedron. The fire triangle consists of having heat, fuel, and oxygen. Removing one of these elements from the triangle and the fire will eventually die out. Principal two is method of heat transfer. Therefore, if heat is transfer from direct contact, liquid or air. A fire of some sort could arise. Methods such as convection, conduction, and radiation. Which is known to be the number one cause of any fire exposure. Principal three in stages and fire growth. This talks about the stages of a fires lowest point of ignition...

Words: 439 - Pages: 2

Premium Essay

Toluene Diisocyanate Fire Report

...During the unloading process at the HLF Polyurethane Manufacturing plants, a vapor return line ruptured causing a fire. This is due to a nearby welding operations at gave the vapor a point of ignition. The product that was being delivered to the manufacturing plant was toluene diisocyanate (TDI), and methylene diphenyl diisocyanate (MDI), which are products used in the production of polyurethane. Once the fire was recognized the alarm was sounded and the emergency response team was notified. The fire department was notified and the command area was establish and the emergency response plan was put into action by the incident commander. The emergency response team was not able to isolate the source, ultimately turning over the incident command and control of the fire to the fire department upon their arrival (Meyer, 2014). Two of the hazardous material that are used to manufacture polyurethane is toluene diisocyanate (TDI), and methylene diphenyl diisocyanate (MDI). Toluene diisocyanate contains a list of hazard that can be identified on the Safety Data Sheet, it is extremely toxic of inhaled, it is considered a carcinogen, and can cause skin reactions....

Words: 613 - Pages: 3

Free Essay

The Evolution of Fire Investigation

...The Evolution of Fire Investigation and Its Impact on Arson Cases Journal Article by Kevin Weitzel Arson investigation is an ever changing field of science and crime investigation. Arson investigators need to be highly educated in their field and unfortunately most are not properly educated resulting in many high profile cases being unfinished or citizens being wrongly convicted. This paper will cover an article by John J. Lentini discussing these topics. Fire investigation is a complex field of work that unfortunately is not drawing in college graduates because of its low pay scale. This in turn makes being a fire investigator just a matter of learning from the older more experienced fire investigators who they themselves were never properly educated. To quote Lentini (p. 1 2012) “The reality is that the fire investigation profession has within its ranks a large number of individuals who don’t know what they’re doing”. This is quite a disturbing thing to read, professional testimonies we rely on to send people away for 10, 20, or even 50 years in prison could be complete hacks, taught by hacks, and really have no idea what they’re doing but nobody else will question them either, which makes all of this a lot worse. In 1994, a group of scientists including John J. Lentini developed a position paper stating that an accelerate detecting canine (ADC) alert was in fact not suitable for a jury to hear but were in fact much more suitable as a means to prove probable cause to...

Words: 480 - Pages: 2