SlideShare une entreprise Scribd logo
1  sur  24
PRESENTATION
ON
FIREWALL
Submitted by:
Gaurav Rajput
15-CAB-17
Contents :
 Introduction.
 What is an attack
 Hardware Firewalls
 Software Firewalls
 Firewall rules
 Types of Firewall techniques
 What a personal firewall can do
 What a personal firewall cannot do
 Conclusion
Introduction
A firewall is a device (or software feature) designed to
control the flow of traffic into and out-of a network.
 It is used to prevent unauthorized programs or Internet
users from accessing a private network
It monitors and controls the incoming and outgoing
network traffic based on predetermined security
rules.
In general, firewalls are installed to prevent
attacks.
What is an Attack?
Attack covers many things:
1. Someone probing a network for computers.
2. Someone attempting to crash services on a
computer.
3. Someone attempting to crash a computer.
4. Someone attempting to gain access to a computer
to use resources or information.
Hardware Vs Software Firewalls
Hardware firewalls
o Implemented on router level.
o Protect an entire network.
o Usually more expensive, harder to implement.
Software firewalls
o Protects a single computer.
o Usually less expensive, easier to implement.
Hardware Firewalls
Hardware firewalls are used more in companies and large
corporations.
 These devices are usually placed between the router and
the Internet connection.
A hardware firewall uses packet filtering to examine the
header of a packet to determine its source and destination.
 This information is compared to a set of predefined or
user-created rules that determine whether the packet is to
be forwarded or dropped.
Software Firewalls
For individual home users, the most popular firewall choice
is a software firewall. Software firewalls are installed on
your computer (like any software).
We can customize it; allowing us some control over its
function and protection features.
It protect our computer from outside attempts to control or
gain access our computer.
It also provide protection against the most common Trojan
programs or e-mail worms.
Inspects each individual “packet” of data as it arrives
either side of firewall.
Determines if it should me pass through or blocked.
Types of firewall technique
1. Packet filtering firewall
2. Application proxy firewall
3. Stateful inspection firewall
4. Circuit – level gateway firewall
Packet filtering firewall
A packet filtering firewall applies a set of rules to each
incoming and outgoing IP packet and then forwards or
discards the packet.
Filtering rules are based on information contained in
network packet.
 Sources IP address
 Destination IP address
 Sources and destination transport level address
 IP protocol field
 Interface
Packet filtering firewall
Two default policies are there to take default action to
determine whether to forward or discard the packet.
 Some possible attacks on firewall :
 Default = discard
 Default = forward
 IP address spoofing
 Source routing attacks
 Tiny fragment attacks
Packet filtering firewall
Advantage :
Disadvantage :
 Cost
 Low resource usage
 Best suited for smaller network
 Can work only on the network layer
 Do not support complex rule based support
 Vulnerable to spoofing
Application Proxy Firewall
An application – level gateway, also called an application
proxy , acts as a rely of application – level traffic.
It don’t allow any packets to directly pass between an
application and the user.
User requests service from proxy.
Proxy validates requests as legal.
Then actions requests and returns result to user.
Can log / audit traffic at application level.
Application Proxy Firewall
Advantages :
Disadvantages :
 More secure than packet filter firewalls.
 Easy to log and audit incoming traffic.
 Additional processing overhead on each connections.
Stateful Inspection firewall
A stateful inspection packet firewall tightens up the rules
for TCP traffic by creating a directory of outbound TCP
connections.
There is an entry for each currently established
connections.
The packet filter now allow incoming traffic to high –
numbered ports only for those packets that fit the profile
of one of the entries in this directory.
A stateful packet inspection firewall reviews the same
packet information as a packet filtering firewall , but also
records information about TCP connections.
Stateful Inspection firewall
It records session information such as IP addresses and
port numbers, which implement a much tighter security
posture than a static packet filter firewall.
It examines both incoming and outgoing packets
Circuit – level gateway Firewall
 This can be a stand – alone system or it can be a specialized
functions performed by an application – level gateway for certain
applications.
 It does not permit an end – to – end TCP connection; rather , the
gateways sets two TCP connections.
 A typical use of the circuit – level gateways is a situation in which
the system administrator trusts the internal users.
 The gateways can be configured to support application – level or
proxy service on inbound connections and circuit- level functions
for outbound connections.
Circuit – level gateway Firewall
Advantage :
Disadvantage:
 Comparatively inexpensive and provide Anonymity to the
private network.
 Do not filter individual Packets.
What a personal Firewall can do
Stop hackers from accessing your computer.
Protect your personal information.
Blocks “pop up” ads and certain cookies.
Determine which program can access the internet.
Blocks invalid packets.
What a personal Firewall can not do
Cannot prevent e-mail viruses.
only an antivirus product with update
definitions can prevent e-mail viruses.
 After seeing it initially, you cannot forget about it.
The firewall will require periodic updates
to the set rules and the software itself.
Conclusion
It is clear that some form of security for private networks
connected to the internet is essential.
A firewall is an important and necessary part of that
security , but cannot be expected to perform all the
required security functions
THANK YOU
Firewall presentation

Contenu connexe

Tendances (20)

Firewall
FirewallFirewall
Firewall
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall
FirewallFirewall
Firewall
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Firewall
Firewall Firewall
Firewall
 
Dmz
Dmz Dmz
Dmz
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Network security
Network securityNetwork security
Network security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
What is firewall
What is firewallWhat is firewall
What is firewall
 

Similaire à Firewall presentation (20)

Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall
FirewallFirewall
Firewall
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Net Defender
Net DefenderNet Defender
Net Defender
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 

Dernier

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Dernier (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 

Firewall presentation

  • 2. Contents :  Introduction.  What is an attack  Hardware Firewalls  Software Firewalls  Firewall rules  Types of Firewall techniques  What a personal firewall can do  What a personal firewall cannot do  Conclusion
  • 3. Introduction A firewall is a device (or software feature) designed to control the flow of traffic into and out-of a network.  It is used to prevent unauthorized programs or Internet users from accessing a private network
  • 4. It monitors and controls the incoming and outgoing network traffic based on predetermined security rules. In general, firewalls are installed to prevent attacks.
  • 5. What is an Attack? Attack covers many things: 1. Someone probing a network for computers. 2. Someone attempting to crash services on a computer. 3. Someone attempting to crash a computer. 4. Someone attempting to gain access to a computer to use resources or information.
  • 6. Hardware Vs Software Firewalls Hardware firewalls o Implemented on router level. o Protect an entire network. o Usually more expensive, harder to implement. Software firewalls o Protects a single computer. o Usually less expensive, easier to implement.
  • 7. Hardware Firewalls Hardware firewalls are used more in companies and large corporations.  These devices are usually placed between the router and the Internet connection. A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination.  This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped.
  • 8. Software Firewalls For individual home users, the most popular firewall choice is a software firewall. Software firewalls are installed on your computer (like any software). We can customize it; allowing us some control over its function and protection features. It protect our computer from outside attempts to control or gain access our computer. It also provide protection against the most common Trojan programs or e-mail worms.
  • 9. Inspects each individual “packet” of data as it arrives either side of firewall. Determines if it should me pass through or blocked.
  • 10. Types of firewall technique 1. Packet filtering firewall 2. Application proxy firewall 3. Stateful inspection firewall 4. Circuit – level gateway firewall
  • 11. Packet filtering firewall A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. Filtering rules are based on information contained in network packet.  Sources IP address  Destination IP address  Sources and destination transport level address  IP protocol field  Interface
  • 12. Packet filtering firewall Two default policies are there to take default action to determine whether to forward or discard the packet.  Some possible attacks on firewall :  Default = discard  Default = forward  IP address spoofing  Source routing attacks  Tiny fragment attacks
  • 13. Packet filtering firewall Advantage : Disadvantage :  Cost  Low resource usage  Best suited for smaller network  Can work only on the network layer  Do not support complex rule based support  Vulnerable to spoofing
  • 14. Application Proxy Firewall An application – level gateway, also called an application proxy , acts as a rely of application – level traffic. It don’t allow any packets to directly pass between an application and the user. User requests service from proxy. Proxy validates requests as legal. Then actions requests and returns result to user. Can log / audit traffic at application level.
  • 15. Application Proxy Firewall Advantages : Disadvantages :  More secure than packet filter firewalls.  Easy to log and audit incoming traffic.  Additional processing overhead on each connections.
  • 16. Stateful Inspection firewall A stateful inspection packet firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections. There is an entry for each currently established connections. The packet filter now allow incoming traffic to high – numbered ports only for those packets that fit the profile of one of the entries in this directory. A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall , but also records information about TCP connections.
  • 17. Stateful Inspection firewall It records session information such as IP addresses and port numbers, which implement a much tighter security posture than a static packet filter firewall. It examines both incoming and outgoing packets
  • 18. Circuit – level gateway Firewall  This can be a stand – alone system or it can be a specialized functions performed by an application – level gateway for certain applications.  It does not permit an end – to – end TCP connection; rather , the gateways sets two TCP connections.  A typical use of the circuit – level gateways is a situation in which the system administrator trusts the internal users.  The gateways can be configured to support application – level or proxy service on inbound connections and circuit- level functions for outbound connections.
  • 19. Circuit – level gateway Firewall Advantage : Disadvantage:  Comparatively inexpensive and provide Anonymity to the private network.  Do not filter individual Packets.
  • 20. What a personal Firewall can do Stop hackers from accessing your computer. Protect your personal information. Blocks “pop up” ads and certain cookies. Determine which program can access the internet. Blocks invalid packets.
  • 21. What a personal Firewall can not do Cannot prevent e-mail viruses. only an antivirus product with update definitions can prevent e-mail viruses.  After seeing it initially, you cannot forget about it. The firewall will require periodic updates to the set rules and the software itself.
  • 22. Conclusion It is clear that some form of security for private networks connected to the internet is essential. A firewall is an important and necessary part of that security , but cannot be expected to perform all the required security functions