SlideShare une entreprise Scribd logo
1  sur  21
FIREWALL
Presented to
Sir Pir Amad Ali Shah
Group Member
1. Muhammad Sohaib Afzaal
2. Adil Asghar
CONTENT
1. Introduction
2. History
3. Software Firewall
4. Hardware Firewall
5. Types
6. Technique
INTRODUCTION
A. A firewall is a network security system designed to
prevent unauthorized access to or from a private
network.
B. Firewalls can be implemented in both hardware and
software, or a combination of both.
C. Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets.
D. All messages entering or leaving the intranet pass
through the firewall, which examines each message and
blocks those that do not meet the specified security
criteria.
HISTORY
1. Computer security borrowed the term firewall from
firefighting and fire prevention, where a firewall is
a barrier established to prevent the spread of fire.
2. When organizations began moving from mainframe
computers and dumb clients to the client-server
model, the ability to control access to the server
became a priority.
3. Before firewalls emerged in the late 1980s, the only
real form of network security was performed by
access control lists (ACLs) residing on routers.
4. ACLs determined which IP addresses were granted
or denied access to the network.
HISTORY
5. The growth of the Internet and the resulting
increased connectivity of networks meant that
this type of filtering was no longer enough to
keep out malicious traffic as only basic
information about network traffic is contained
in the packet headers.
6. Digital Equipment Corp. shipped the first
commercial firewall, DEC SEAL, in 1992, and
firewall technology has since evolved to
combat the increasing sophistication of
cyberattacks.
HISTORY
1. Clifford Stoll's discovery of German spies tampering with his
system
2. Bill Cheswick's "Evening with Berferd" 1992, in which he set
up a simple electronic "jail" to observe an attacker
3. In 1988, an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS! It has hit
Berkeley, UC San Diego, Lawrence Livermore, Stanford, and
NASAAmes."
4. The Morris Worm spread itself through multiple vulnerabilities
in the machines of the time. Although it was not malicious in
intent, the Morris Worm was the first large scale attack on
Internet security; the online community was neither expecting
an attack nor prepared to deal with one.
HARDWARE FIREWALL
• Hardware firewalls can be purchased as a
stand-alone product but are also typically
found in broadband routers, and should be
considered an important part of your system
and network set-up.
• Most hardware firewalls will have a minimum
of four network ports to connect other
computers, but for larger networks, business
networking firewall solutions are available.
SOFTWARE FIREWALLS
• Software firewalls are installed on your
computer (like any software) and you can
customize it; allowing you some control over
its function and protection features.
• A software firewall will protect your computer
from outside attempts to control or gain access
your computer.
TYPES
1. Proxy firewall
2. Stateful inspection firewall
3. Unified threat management (UTM)
firewall
4. Next-generation firewall (NGFW)
5. Threat-focused NGFW
PROXY FIREWALL
I. An early type of firewall device, a proxy firewall
serves as the gateway from one network to
another for a specific application.
II. Proxy servers can provide additional
functionality such as content caching and
security by preventing direct connections from
outside the network.
III. However, this also may impact throughput
capabilities and the applications they can
support.
STATEFUL INSPECTION FIREWALL
I. Now thought of as a “traditional” firewall, a
stateful inspection firewall allows or blocks traffic
based on state, port, and protocol.
II. It monitors all activity from the opening of a
connection until it is closed.
III. Filtering decisions are made based on both
administrator-defined rules as well as context,
which refers to using information from previous
connections and packets belonging to the same
connection.
Unified threat management
(UTM) firewall
I. A UTM device typically combines, in a loosely
coupled way, the functions of a stateful
inspection firewall with intrusion prevention
and antivirus.
II. It may also include additional services and
often cloud management. UTMs focus on
simplicity and ease of use.
Next-generation firewall (NGFW)
Firewalls have evolved beyond simple packet
filtering and stateful inspection.
Most companies are deploying next-generation
firewalls to block modern threats such as
advanced malware and application-layer attacks.
According to Gartner, Inc.’s definition, a next-
generation firewall must include:
1. Standard firewall capabilities like stateful
inspection
2. Integrated intrusion prevention
Next-generation firewall (NGFW)
3. Application awareness and control to see and
block risky apps
4. Upgrade paths to include future information feeds
5. Techniques to address evolving security threats
6. While these capabilities are increasingly becoming
the standard for most companies, NGFWs can do
more.
Threat-focused NGFW
• These firewalls include all the capabilities of a
traditional NGFW and also provide advanced
threat detection and remediation. With a threat-
focused NGFW you can:
1. Know which assets are most at risk with
complete context awareness
2. Quickly react to attacks with intelligent
security automation that sets policies and
hardens your defenses dynamically
Threat-focused NGFW
3. Better detect evasive or suspicious activity with
network and endpoint event correlation
4. Greatly decrease the time from detection to
cleanup with retrospective security that
continuously monitors for suspicious activity and
behavior even after initial inspection
5. Ease administration and reduce complexity with
unified policies that protect across the entire
attack continuum.
Firewall Filtering Techniques
Firewalls are used to protect both home and
corporate networks.
A typical firewall program or hardware device
filters all information coming through the
Internet to your network or computer system.
There are several types of firewall techniques
that will prevent potentially harmful
information from getting through:
Firewall Filtering Techniques
1. Packet Filter: Looks at each packet entering or
leaving the network and accepts or rejects it
based on user-defined rules. Packet filtering is
fairly effective and transparent to users, but it is
difficult to configure. In addition, it is
susceptible to IP spoofing.
2. Application Gateway: Applies security
mechanisms to specific applications, such as FTP
and Telnet servers. This is very effective, but can
impose a performance degradation.
Firewall Filtering Techniques
3. Circuit-level Gateway: Applies security mechanisms
when a TCP or UDP connection is established. Once the
connection has been made, packets can flow between
the hosts without further checking.
4. Proxy Server: Intercepts all messages entering and
leaving the network. The proxy server effectively hides
the true network addresses.
• In practice, many firewalls use two or more of these
techniques in concert. A firewall is considered a first line
of defense in protecting private information. For greater
security, data can be encrypted.
REFERENCE
https://en.wikipedia.org/wiki/Firewall_(computing)
http://www.webopedia.com/TERM/F/firewall.html
http://www.cisco.com/c/en/us/products/security/firewalls/what
-is-a-firewall.html
http://whatismyipaddress.com/firewall
https://www.paloaltonetworks.com/documentation/glossary/wha
t-is-a-firewall
https://www.microsoft.com/en-us/safety/pc-security/firewalls-
whatis.aspx
http://searchsecurity.techtarget.com/definition/firewall

Contenu connexe

Tendances

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 

Tendances (20)

What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Firewall
FirewallFirewall
Firewall
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Dmz
Dmz Dmz
Dmz
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 

En vedette

Firewall
FirewallFirewall
Firewall
lyndyv
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

En vedette (8)

Firewall
FirewallFirewall
Firewall
 
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Tracxn Research — Industrial IoT Landscape, October 2016
Tracxn Research —  Industrial IoT Landscape, October 2016Tracxn Research —  Industrial IoT Landscape, October 2016
Tracxn Research — Industrial IoT Landscape, October 2016
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Firewall
FirewallFirewall
Firewall
 

Similaire à Firewall

Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
jibinsh
 

Similaire à Firewall (20)

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
FIREWALLS.pptx
FIREWALLS.pptxFIREWALLS.pptx
FIREWALLS.pptx
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Firewall
FirewallFirewall
Firewall
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 

Plus de Muhammad Sohaib Afzaal

Plus de Muhammad Sohaib Afzaal (20)

Culture advertisement from marketing ads
Culture advertisement from marketing adsCulture advertisement from marketing ads
Culture advertisement from marketing ads
 
Mughal Architecture Palaces
Mughal Architecture PalacesMughal Architecture Palaces
Mughal Architecture Palaces
 
Modernity
ModernityModernity
Modernity
 
Conflict theory
Conflict theoryConflict theory
Conflict theory
 
Effects of the modernization process on human communication
Effects of the modernization process on human communicationEffects of the modernization process on human communication
Effects of the modernization process on human communication
 
Culture & types
Culture &  typesCulture &  types
Culture & types
 
Iconology
IconologyIconology
Iconology
 
Postmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalismPostmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalism
 
Hybrid cultures,
Hybrid cultures,Hybrid cultures,
Hybrid cultures,
 
Anti virus
Anti virusAnti virus
Anti virus
 
News agencies & press laws
News agencies &  press lawsNews agencies &  press laws
News agencies & press laws
 
American online
American onlineAmerican online
American online
 
Development of Reuters
Development of ReutersDevelopment of Reuters
Development of Reuters
 
Impact of media
Impact of mediaImpact of media
Impact of media
 
Normative theory
Normative theoryNormative theory
Normative theory
 
Conspiracy Theory
Conspiracy TheoryConspiracy Theory
Conspiracy Theory
 
Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002
 
Pemra
PemraPemra
Pemra
 
Theatre
TheatreTheatre
Theatre
 
Use of learning
Use of learningUse of learning
Use of learning
 

Dernier

一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
wpkuukw
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
amitlee9823
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Naicy mandal
 
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
amitlee9823
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
tufbav
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
amitlee9823
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
wpkuukw
 

Dernier (20)

一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In RT Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men  🔝kakinada🔝   Escor...
➥🔝 7737669865 🔝▻ kakinada Call-girls in Women Seeking Men 🔝kakinada🔝 Escor...
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Pimple Saudagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
 

Firewall

  • 2. Group Member 1. Muhammad Sohaib Afzaal 2. Adil Asghar
  • 3. CONTENT 1. Introduction 2. History 3. Software Firewall 4. Hardware Firewall 5. Types 6. Technique
  • 4. INTRODUCTION A. A firewall is a network security system designed to prevent unauthorized access to or from a private network. B. Firewalls can be implemented in both hardware and software, or a combination of both. C. Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. D. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  • 5. HISTORY 1. Computer security borrowed the term firewall from firefighting and fire prevention, where a firewall is a barrier established to prevent the spread of fire. 2. When organizations began moving from mainframe computers and dumb clients to the client-server model, the ability to control access to the server became a priority. 3. Before firewalls emerged in the late 1980s, the only real form of network security was performed by access control lists (ACLs) residing on routers. 4. ACLs determined which IP addresses were granted or denied access to the network.
  • 6. HISTORY 5. The growth of the Internet and the resulting increased connectivity of networks meant that this type of filtering was no longer enough to keep out malicious traffic as only basic information about network traffic is contained in the packet headers. 6. Digital Equipment Corp. shipped the first commercial firewall, DEC SEAL, in 1992, and firewall technology has since evolved to combat the increasing sophistication of cyberattacks.
  • 7. HISTORY 1. Clifford Stoll's discovery of German spies tampering with his system 2. Bill Cheswick's "Evening with Berferd" 1992, in which he set up a simple electronic "jail" to observe an attacker 3. In 1988, an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS! It has hit Berkeley, UC San Diego, Lawrence Livermore, Stanford, and NASAAmes." 4. The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one.
  • 8. HARDWARE FIREWALL • Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. • Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.
  • 9. SOFTWARE FIREWALLS • Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. • A software firewall will protect your computer from outside attempts to control or gain access your computer.
  • 10. TYPES 1. Proxy firewall 2. Stateful inspection firewall 3. Unified threat management (UTM) firewall 4. Next-generation firewall (NGFW) 5. Threat-focused NGFW
  • 11. PROXY FIREWALL I. An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application. II. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. III. However, this also may impact throughput capabilities and the applications they can support.
  • 12. STATEFUL INSPECTION FIREWALL I. Now thought of as a “traditional” firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. II. It monitors all activity from the opening of a connection until it is closed. III. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection.
  • 13. Unified threat management (UTM) firewall I. A UTM device typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus. II. It may also include additional services and often cloud management. UTMs focus on simplicity and ease of use.
  • 14. Next-generation firewall (NGFW) Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks. According to Gartner, Inc.’s definition, a next- generation firewall must include: 1. Standard firewall capabilities like stateful inspection 2. Integrated intrusion prevention
  • 15. Next-generation firewall (NGFW) 3. Application awareness and control to see and block risky apps 4. Upgrade paths to include future information feeds 5. Techniques to address evolving security threats 6. While these capabilities are increasingly becoming the standard for most companies, NGFWs can do more.
  • 16. Threat-focused NGFW • These firewalls include all the capabilities of a traditional NGFW and also provide advanced threat detection and remediation. With a threat- focused NGFW you can: 1. Know which assets are most at risk with complete context awareness 2. Quickly react to attacks with intelligent security automation that sets policies and hardens your defenses dynamically
  • 17. Threat-focused NGFW 3. Better detect evasive or suspicious activity with network and endpoint event correlation 4. Greatly decrease the time from detection to cleanup with retrospective security that continuously monitors for suspicious activity and behavior even after initial inspection 5. Ease administration and reduce complexity with unified policies that protect across the entire attack continuum.
  • 18. Firewall Filtering Techniques Firewalls are used to protect both home and corporate networks. A typical firewall program or hardware device filters all information coming through the Internet to your network or computer system. There are several types of firewall techniques that will prevent potentially harmful information from getting through:
  • 19. Firewall Filtering Techniques 1. Packet Filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. 2. Application Gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
  • 20. Firewall Filtering Techniques 3. Circuit-level Gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. 4. Proxy Server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. • In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.