SlideShare une entreprise Scribd logo
1  sur  24
Institute of Management StudiesInstitute of Management Studies
DAVV, IndoreDAVV, Indore
Document Security And FirewallDocument Security And Firewall
Session - 2014Session - 2014
Presentation to:
Achal Hardia
Faculty IMS, DAVV
Presentation By:
Rupa Dwivedi
Sakshi Jain
Sanjay Singh
Shubhangi Mahajan
E-Commerce, 2nd
Sem
ContentContent
• Introduction to Document Security
• Criteria of Document Security
• Techniques of Document Security
• Firewall
• Types of Firewall
• Conclusion
Introduction to documentIntroduction to document
SecuritySecurity
Document Security: The protection of documents
against the deliberate or accidental access of
unauthorized persons.
 Main reason why organization need to address
the security of electronically shared documents:
◦ Regulatory requirements
◦ Return on investment (ROI)
◦ Information security
Regulatory requirements
Many companies are directly or indirectly affected by
government mandates and regulations for providing
consumer privacy.
Return on investment (ROI)
◦ Significant ROI can be achieved by migrating to electronic
business processes
◦ Automated workflows allow prospects, customers,
partners, and suppliers to participate, enabling
organizations to reap significant cost savings while
improving customer satisfaction and loyalty
Information security
Thefts of proprietary information are increasing, which can
jeopardize revenue, competitive advantage, and customer
relationships; generate negative publicity; and result in
significant penalties and fines for failure to comply with
privacy laws.
How to provide document securityHow to provide document security
• The following criteria define persistent document security:
– Confidentiality—Who should have access to the
document?
– Authorization—What permissions does the user have for
working with the document?
– Accountability—What has the recipient done with the
document?
– Integrity—How do you know if the document has been
altered?
– Non-repudiation—Can the signatory deny signing the
document?
– Authenticity—How do you know where the document
came from?
Security Techniques
Document control
Digital signatures
Document ControlDocument Control
Encryption is the process of transforming
information (plaintext) into an
incomprehensible form (ciphertext).
Encryption is an effective technique for
managing document access.
Decryption is the reverse process that
transforms ciphertext back to the original
plaintext.
Cryptography refers to the two processes
of encryption and decryption and its
implementation is referred to as a
cryptosystem.
Digital signaturesDigital signatures
 When enterprises distribute documents electronically,
it is often important that recipients can verify:
◦ That the content has not been altered (integrity)
◦ That the document is coming from the actual
person who sent it (authenticity)
◦ That an individual who has signed the document
cannot deny the signature(non-repudiation)
Apply code
Create unique hash/ ID of electronic
document
Apply digital signature
Confidentiality
Authorization
Accountability
Integrity
Authenticity
Non-repudiation
• Sign signature page
• Submit 15-20 pages (non-
secure) with signature
page to LoC
• Only page authenticated is
signature page
Digital Signatures
Complete
document is
locked and
verifiable
Signature ProcessSignature Process
• Data is converted to pdf
document
• A unique hash key is computed
for pdf document
• User supplied key is used to
encrypt the hash key
• The encrypted hash key is
attached to the pdf document
• Document is digitally signed
Conclusion To DocumentConclusion To Document
SecuritySecurity
 A significantly more effective solution for protecting an
electronic document is to assign security parameters that are an
integral part of the document itself.
 By applying security parameters to the individual document,
organizations gain greater assurance in the confidentiality,
authenticity, and integrity of electronically shared documents in
addition to securing the communication line or storage location.
 As organizations accelerate online processing, External security
solutions deliver document control and digital signature services
that simplify the process of protecting sensitive electronic
documents and forms.
What is firewall ?What is firewall ?
 A firewall is a software feature designed
to control the flow of traffic into and out-of
a network.
 A firewall is a specially programmed
router that sits between a site and the
rest of the network .
 It is used to enforce security policy .
HOW FIREWALL WORK ?HOW FIREWALL WORK ?
Types of firewalls ?Types of firewalls ?
Packet filters
Circuit level
Application level
Stateful multilayer
Packet FilteringPacket Filtering
Circuit Level GatewayCircuit Level Gateway
Application LevelApplication Level
Stateful MultilayerStateful Multilayer
General PerformanceGeneral Performance
Free Firewall Software PackagesFree Firewall Software Packages
IP Chains & IP Tables
◦ comes with most linux distributions
SELinux (Security Enabled Linux – NSA)
◦ comes with some Linux distributions
 Fedora, RedHat
Home & Personal Routers Provide
◦ configurable packet filtering
◦ NAT/DHCP
Enterprise Firewalls
 Cisco PIX (product family)
 MS Internet Security & Acceleration Server
ConclusionConclusion
It is clear that some form of security for
private networks connected to the
Internet is essential
A firewall is an important and necessary
part of that security, but cannot be
expected to perform all the required
security functions.
Document security & firewall

Contenu connexe

Tendances

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 

Tendances (20)

Information Security
Information SecurityInformation Security
Information Security
 
Email security
Email securityEmail security
Email security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Email security
Email securityEmail security
Email security
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
03 cia
03 cia03 cia
03 cia
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
E business security
E business securityE business security
E business security
 
Information security
Information securityInformation security
Information security
 
امن المعلومات المحاضرة الخامسة
امن المعلومات المحاضرة الخامسةامن المعلومات المحاضرة الخامسة
امن المعلومات المحاضرة الخامسة
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Port scanning
Port scanningPort scanning
Port scanning
 
Spoofing
SpoofingSpoofing
Spoofing
 

En vedette (6)

Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Bottom up parser
Bottom up parserBottom up parser
Bottom up parser
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Similaire à Document security & firewall

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
Lucas Gritziotis
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
Federation for Identity and Cross-Credentialing Systems (FiXs)
 

Similaire à Document security & firewall (20)

Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By Design
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Ppt
PptPpt
Ppt
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and Security
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
ProofeasyPPT.pptx
ProofeasyPPT.pptxProofeasyPPT.pptx
ProofeasyPPT.pptx
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Security problems.pptx
Security problems.pptxSecurity problems.pptx
Security problems.pptx
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 

Dernier

💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 

Dernier (20)

Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 

Document security & firewall

  • 1. Institute of Management StudiesInstitute of Management Studies DAVV, IndoreDAVV, Indore Document Security And FirewallDocument Security And Firewall Session - 2014Session - 2014 Presentation to: Achal Hardia Faculty IMS, DAVV Presentation By: Rupa Dwivedi Sakshi Jain Sanjay Singh Shubhangi Mahajan E-Commerce, 2nd Sem
  • 2. ContentContent • Introduction to Document Security • Criteria of Document Security • Techniques of Document Security • Firewall • Types of Firewall • Conclusion
  • 3. Introduction to documentIntroduction to document SecuritySecurity Document Security: The protection of documents against the deliberate or accidental access of unauthorized persons.  Main reason why organization need to address the security of electronically shared documents: ◦ Regulatory requirements ◦ Return on investment (ROI) ◦ Information security
  • 4. Regulatory requirements Many companies are directly or indirectly affected by government mandates and regulations for providing consumer privacy. Return on investment (ROI) ◦ Significant ROI can be achieved by migrating to electronic business processes ◦ Automated workflows allow prospects, customers, partners, and suppliers to participate, enabling organizations to reap significant cost savings while improving customer satisfaction and loyalty Information security Thefts of proprietary information are increasing, which can jeopardize revenue, competitive advantage, and customer relationships; generate negative publicity; and result in significant penalties and fines for failure to comply with privacy laws.
  • 5. How to provide document securityHow to provide document security • The following criteria define persistent document security: – Confidentiality—Who should have access to the document? – Authorization—What permissions does the user have for working with the document? – Accountability—What has the recipient done with the document? – Integrity—How do you know if the document has been altered? – Non-repudiation—Can the signatory deny signing the document? – Authenticity—How do you know where the document came from?
  • 6.
  • 8. Document ControlDocument Control Encryption is the process of transforming information (plaintext) into an incomprehensible form (ciphertext). Encryption is an effective technique for managing document access. Decryption is the reverse process that transforms ciphertext back to the original plaintext. Cryptography refers to the two processes of encryption and decryption and its implementation is referred to as a cryptosystem.
  • 9. Digital signaturesDigital signatures  When enterprises distribute documents electronically, it is often important that recipients can verify: ◦ That the content has not been altered (integrity) ◦ That the document is coming from the actual person who sent it (authenticity) ◦ That an individual who has signed the document cannot deny the signature(non-repudiation)
  • 10. Apply code Create unique hash/ ID of electronic document Apply digital signature Confidentiality Authorization Accountability Integrity Authenticity Non-repudiation • Sign signature page • Submit 15-20 pages (non- secure) with signature page to LoC • Only page authenticated is signature page Digital Signatures Complete document is locked and verifiable
  • 11. Signature ProcessSignature Process • Data is converted to pdf document • A unique hash key is computed for pdf document • User supplied key is used to encrypt the hash key • The encrypted hash key is attached to the pdf document • Document is digitally signed
  • 12. Conclusion To DocumentConclusion To Document SecuritySecurity  A significantly more effective solution for protecting an electronic document is to assign security parameters that are an integral part of the document itself.  By applying security parameters to the individual document, organizations gain greater assurance in the confidentiality, authenticity, and integrity of electronically shared documents in addition to securing the communication line or storage location.  As organizations accelerate online processing, External security solutions deliver document control and digital signature services that simplify the process of protecting sensitive electronic documents and forms.
  • 13. What is firewall ?What is firewall ?  A firewall is a software feature designed to control the flow of traffic into and out-of a network.  A firewall is a specially programmed router that sits between a site and the rest of the network .  It is used to enforce security policy .
  • 14. HOW FIREWALL WORK ?HOW FIREWALL WORK ?
  • 15. Types of firewalls ?Types of firewalls ? Packet filters Circuit level Application level Stateful multilayer
  • 21. Free Firewall Software PackagesFree Firewall Software Packages IP Chains & IP Tables ◦ comes with most linux distributions SELinux (Security Enabled Linux – NSA) ◦ comes with some Linux distributions  Fedora, RedHat
  • 22. Home & Personal Routers Provide ◦ configurable packet filtering ◦ NAT/DHCP Enterprise Firewalls  Cisco PIX (product family)  MS Internet Security & Acceleration Server
  • 23. ConclusionConclusion It is clear that some form of security for private networks connected to the Internet is essential A firewall is an important and necessary part of that security, but cannot be expected to perform all the required security functions.