SlideShare une entreprise Scribd logo
1  sur  21
Firewall, Antivirus
Software
Dr SAJEENA S.
• Preventive
Measures-
Firewall,
Antivirus
Software
• In the realm of cybersecurity,
Antivirus and Firewall are two
words used interchangeably.
Both are used to protect the
hardware and software of a
computer system.
Firewall
• A firewall is a hardware and software-based
security system designed to protect and monitor
both private internet network and a computer
system. Firewall provides a first line of defense for
the resource in an e-commerce system. It defends
against unauthorized access to systems over the
internet.
• Firewall is defined as “a software or hardware-
software combination that filters communication
packets and prevents some malicious packets from
entering the network, based on a security policy.”
Most organizations place a firewall at the internet
entry point of their networks. The firewall provides
a defense between a network and the internet.
Firewalls
operate on
the
following
principles.
All traffic from inside to outside
and from outside to inside the
network must pass through it.
Only authorized traffic, as defined
by the local security policy, is
allowed to pass through it.
The firewall itself is immune to
penetration.
• Types of Firewalls
• Proxy-based firewalls: These are proxies that
sit in between clients and servers. Clients
connect to the firewall, and the firewall
inspects the outgoing packets, after which it
will create a connection to the intended
recipient (the web server). Similarly, when
the web server attempts to send a response
to the client, the firewall will intercept that
request, inspect the packets, and then
deliver that response in a separate
connection between the firewall and the
client. A proxy-based firewall effectively
prevents a direct connection between the
client and server.
• Stateful firewalls: A stateful application is
one which saves data from previous events
and interactions. A stateful firewall saves
information regarding open connections and
uses this information to analyze incoming
and outgoing traffic, rather than inspecting
each packet. Stateful firewalls rely on a lot of
contexts when making decisions. Stateful
firewalls can also protect ports by keeping
them all closed unless incoming packets
request access to a specific port.
Next-Generation Firewalls (NGFW): These are
firewalls that have the capabilities of traditional
firewalls but also employ a host of added features to
address threats on other layers of the Open Systems
Interconnection (OSI) Model.
Some NGFW-specific features include: Deep packet
inspection (DPI), Application awareness, Identity
awareness and Sandboxing.
Web Application Firewalls (WAF): WAFs help to protect web applications
from malicious users. A WAF helps protect web applications by filtering
and monitoring HTTP traffic between a web application and the Internet.
Packet Filter: It is a network security technique that is used to control
data flow to and from a network.
Gateway Server: Gateway servers is a networking hardware or network
node which connects the two disparate network to communicate with
each other.
•Usefulness
of Firewall
• A firewall can monitor all the incoming
traffic. A two – way firewall can monitor the
exiting data as well and can encrypt it too.
• A firewall limits the Trojan horse from
latching onto your computer files and does
damage to the entire network.
• It stops hackers from entering your
network.
• It reduces the risk of keylogging. Keylogging
is a computer program that records every
keystroke made by a computer user to gain
fraudulent access to passwords and other
confidential information.
• Functions of Firewall
• The basic function of a firewall is to analyse any incoming files from the internet
or other computers before accepting the files to download.
• Block viruses or other malicious files before they reach your computer.
• Firewalls prevent malicious programs from accessing and damaging your
computer system.
• Block unsolicited communication between your computer and other computers
outside the organization.
• Protect your computer from hackers. In e-commerce environment, many hackers
attempt to gain access to your computer without your consent. A firewall can
block them before they install on your computer.
• Control outbound connections from your computer to prevent connection to
unauthorized outside nodes.
• Track and record inbound and outbound connections.
Limitations of Firewall
• Firewalls may potentially interfere with the operation of
some programs that access internet. It may block some
communications required for running a program.
• Firewall software can help block viruses and malware, but it
cannot remove viruses and other malware that has been
loaded onto your computer. In other words, firewall is not an
alternative to using an antivirus program, but an additional
level of protection.
• Firewalls can control the traffic between the computer and
the internet, but they are incapable to recognise any attack
against the computer from within.
• Antivirus Software • The most common method available
to protect the computer system
from virus attack is installing
antivirus program. Antivirus
software is a program that helps to
prevent computer threats such as
viruses, hackers and different types
of malware threats. It scans every
file which comes through the
internet, USB devices or external
hard disk to your computer and
helps to protect your computer from
virus attack.
• Virus protection software (antivirus) ensures the protection of
computer system from the constant threat of different types
of viruses. There are several companies that build and offer
antivirus software. Popular antiviruses are Norton Antivirus,
Kaspersky, Avira, Quick Heal, AVG, McFee, Bitdefender, Panda,
BullGuard etc.
The following are the basic functions offered by all antivirus programs.
Ensures Security: Virus protection software scans a computer, create
firewalls, prevents harmful virus attacks and ensures a computer’s overall
security.
Prevents Online Threats: While surfing, downloading or working online,
the antivirus software prevents threats posed by malicious virus attacks
through e-mail attachments, spurious websites, and other proxy/ third
party freeware downloads.
Protects Critical Data: The antivirus software protects critical files,
documents, presentation and photos stored on a computer from being
infected or damaged through virus attacks or virus downloads during
online activities.
Scanning Alerts: Antivirus software alerts users about scanning a specific
file, drive or pen drive, at any time.
Facilitates Timely Updates: Many virus protection programs ensure the
computer’s protection by automatically updating its security features.
• Benefits of Antivirus Software
• Antivirus solutions protect more than just laptops, office computers, smartphones and
tablets. They protect precious memories, music and photo libraries, and important
documents from destruction by malware.
• Modern antivirus solutions are capable of:
• Detecting, blocking, and removing viruses, malware, and ransomware
• Preventing identity theft and block phishing and fraud
• Warning about dangerous websites and links before you click
• Scanning the Dark Web to find if an email address has been compromised
• Keeping online accounts protected with secure password encryption
• Providing simple training to teach you and your family how to be even safer online
• Tuning up your computer to keep it running smoothly, just like new
• There are fundamental differences between a
firewall and antivirus software. For one, a
firewall is a hardware and software-based
security system designed to protect and monitor
both a private internet network and a computer
system. While antivirus is a software program
that detects and eliminates any threats that will
destroy a computer system.
Differences between Firewall and Antivirus
Firewall Antivirus
A firewall is a security network designed to protect
computer systems and networks from malicious attacks.
Antivirus is a software utility program designed to protect a
system from internal attacks from viruses, trojan horse,
spyware etc
The general term used for a firewall is “packet filter”
because it filters any incoming data packets for suspicious
contents.
Antivirus identifies and corrects any weaknesses found in
the computer system.
The main purpose of a firewall is to monitor network traffic
and restrict any unauthorized entry
The main function of an antivirus is to scan, detect, prevent
and remove any existential threat to the computer system
A firewall works at a network protocol level to safeguard
against any unwanted intrusion
An antivirus will only scan for any harmful programs that are
present in the system such as viruses, worms, Trojans etc
One of the limitations of a firewall is that it cannot block
any internal attacks and also those attacks that bypass its
network coverage
One of the limitations of an antivirus is that it cannot check
read-only files.
DEC SEAL was the first commercially viable firewall program
that came out in 1992. Its creation was spearheaded by
American computer scientists Brian Reed and Jeff Mogul.
The first documented removal of a computer virus was by an
actual antivirus software was in 1987 when a German
computer security expert, Bernard Robert Fix, created a
programme to remove a virus that had infected files in a
DOS-based system
Firewall

Contenu connexe

Tendances

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantagessabari Giri
 

Tendances (20)

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Network security
Network securityNetwork security
Network security
 
System security
System securitySystem security
System security
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Security threats
Security threatsSecurity threats
Security threats
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Wireshark
WiresharkWireshark
Wireshark
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 

Similaire à Firewall

Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Security threats explained
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
 
Firewall
FirewallFirewall
FirewallGarmian
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.pptamuthadeepa
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxDiscuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxrtodd615
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVIKASH MAINANWAL
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBluechipComputerSyst
 

Similaire à Firewall (20)

Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
ANTIVIRUS.pptx
ANTIVIRUS.pptxANTIVIRUS.pptx
ANTIVIRUS.pptx
 
Firewall
FirewallFirewall
Firewall
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxDiscuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
 
Network security
Network securityNetwork security
Network security
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
 

Plus de sajeena81

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicssajeena81
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptxsajeena81
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptxsajeena81
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismsajeena81
 
Life span psychology
Life span psychologyLife span psychology
Life span psychologysajeena81
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approachsajeena81
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical sciencesajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approachsajeena81
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable developmentsajeena81
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learningsajeena81
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical sciencesajeena81
 
Microteaching
MicroteachingMicroteaching
Microteachingsajeena81
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioningsajeena81
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variationsajeena81
 

Plus de sajeena81 (20)

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristics
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptx
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptx
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarism
 
Life span psychology
Life span psychologyLife span psychology
Life span psychology
 
Hacking
HackingHacking
Hacking
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Computer virus
Computer virusComputer virus
Computer virus
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical science
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable development
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learning
 
E content
E contentE content
E content
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical science
 
Microteaching
MicroteachingMicroteaching
Microteaching
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioning
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variation
 

Dernier

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Dernier (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Firewall

  • 2. • Preventive Measures- Firewall, Antivirus Software • In the realm of cybersecurity, Antivirus and Firewall are two words used interchangeably. Both are used to protect the hardware and software of a computer system.
  • 3. Firewall • A firewall is a hardware and software-based security system designed to protect and monitor both private internet network and a computer system. Firewall provides a first line of defense for the resource in an e-commerce system. It defends against unauthorized access to systems over the internet. • Firewall is defined as “a software or hardware- software combination that filters communication packets and prevents some malicious packets from entering the network, based on a security policy.” Most organizations place a firewall at the internet entry point of their networks. The firewall provides a defense between a network and the internet.
  • 4.
  • 5.
  • 6.
  • 7. Firewalls operate on the following principles. All traffic from inside to outside and from outside to inside the network must pass through it. Only authorized traffic, as defined by the local security policy, is allowed to pass through it. The firewall itself is immune to penetration.
  • 8. • Types of Firewalls • Proxy-based firewalls: These are proxies that sit in between clients and servers. Clients connect to the firewall, and the firewall inspects the outgoing packets, after which it will create a connection to the intended recipient (the web server). Similarly, when the web server attempts to send a response to the client, the firewall will intercept that request, inspect the packets, and then deliver that response in a separate connection between the firewall and the client. A proxy-based firewall effectively prevents a direct connection between the client and server.
  • 9. • Stateful firewalls: A stateful application is one which saves data from previous events and interactions. A stateful firewall saves information regarding open connections and uses this information to analyze incoming and outgoing traffic, rather than inspecting each packet. Stateful firewalls rely on a lot of contexts when making decisions. Stateful firewalls can also protect ports by keeping them all closed unless incoming packets request access to a specific port.
  • 10. Next-Generation Firewalls (NGFW): These are firewalls that have the capabilities of traditional firewalls but also employ a host of added features to address threats on other layers of the Open Systems Interconnection (OSI) Model. Some NGFW-specific features include: Deep packet inspection (DPI), Application awareness, Identity awareness and Sandboxing.
  • 11. Web Application Firewalls (WAF): WAFs help to protect web applications from malicious users. A WAF helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. Packet Filter: It is a network security technique that is used to control data flow to and from a network. Gateway Server: Gateway servers is a networking hardware or network node which connects the two disparate network to communicate with each other.
  • 12. •Usefulness of Firewall • A firewall can monitor all the incoming traffic. A two – way firewall can monitor the exiting data as well and can encrypt it too. • A firewall limits the Trojan horse from latching onto your computer files and does damage to the entire network. • It stops hackers from entering your network. • It reduces the risk of keylogging. Keylogging is a computer program that records every keystroke made by a computer user to gain fraudulent access to passwords and other confidential information.
  • 13. • Functions of Firewall • The basic function of a firewall is to analyse any incoming files from the internet or other computers before accepting the files to download. • Block viruses or other malicious files before they reach your computer. • Firewalls prevent malicious programs from accessing and damaging your computer system. • Block unsolicited communication between your computer and other computers outside the organization. • Protect your computer from hackers. In e-commerce environment, many hackers attempt to gain access to your computer without your consent. A firewall can block them before they install on your computer. • Control outbound connections from your computer to prevent connection to unauthorized outside nodes. • Track and record inbound and outbound connections.
  • 14. Limitations of Firewall • Firewalls may potentially interfere with the operation of some programs that access internet. It may block some communications required for running a program. • Firewall software can help block viruses and malware, but it cannot remove viruses and other malware that has been loaded onto your computer. In other words, firewall is not an alternative to using an antivirus program, but an additional level of protection. • Firewalls can control the traffic between the computer and the internet, but they are incapable to recognise any attack against the computer from within.
  • 15. • Antivirus Software • The most common method available to protect the computer system from virus attack is installing antivirus program. Antivirus software is a program that helps to prevent computer threats such as viruses, hackers and different types of malware threats. It scans every file which comes through the internet, USB devices or external hard disk to your computer and helps to protect your computer from virus attack.
  • 16. • Virus protection software (antivirus) ensures the protection of computer system from the constant threat of different types of viruses. There are several companies that build and offer antivirus software. Popular antiviruses are Norton Antivirus, Kaspersky, Avira, Quick Heal, AVG, McFee, Bitdefender, Panda, BullGuard etc.
  • 17. The following are the basic functions offered by all antivirus programs. Ensures Security: Virus protection software scans a computer, create firewalls, prevents harmful virus attacks and ensures a computer’s overall security. Prevents Online Threats: While surfing, downloading or working online, the antivirus software prevents threats posed by malicious virus attacks through e-mail attachments, spurious websites, and other proxy/ third party freeware downloads. Protects Critical Data: The antivirus software protects critical files, documents, presentation and photos stored on a computer from being infected or damaged through virus attacks or virus downloads during online activities. Scanning Alerts: Antivirus software alerts users about scanning a specific file, drive or pen drive, at any time. Facilitates Timely Updates: Many virus protection programs ensure the computer’s protection by automatically updating its security features.
  • 18. • Benefits of Antivirus Software • Antivirus solutions protect more than just laptops, office computers, smartphones and tablets. They protect precious memories, music and photo libraries, and important documents from destruction by malware. • Modern antivirus solutions are capable of: • Detecting, blocking, and removing viruses, malware, and ransomware • Preventing identity theft and block phishing and fraud • Warning about dangerous websites and links before you click • Scanning the Dark Web to find if an email address has been compromised • Keeping online accounts protected with secure password encryption • Providing simple training to teach you and your family how to be even safer online • Tuning up your computer to keep it running smoothly, just like new
  • 19. • There are fundamental differences between a firewall and antivirus software. For one, a firewall is a hardware and software-based security system designed to protect and monitor both a private internet network and a computer system. While antivirus is a software program that detects and eliminates any threats that will destroy a computer system.
  • 20. Differences between Firewall and Antivirus Firewall Antivirus A firewall is a security network designed to protect computer systems and networks from malicious attacks. Antivirus is a software utility program designed to protect a system from internal attacks from viruses, trojan horse, spyware etc The general term used for a firewall is “packet filter” because it filters any incoming data packets for suspicious contents. Antivirus identifies and corrects any weaknesses found in the computer system. The main purpose of a firewall is to monitor network traffic and restrict any unauthorized entry The main function of an antivirus is to scan, detect, prevent and remove any existential threat to the computer system A firewall works at a network protocol level to safeguard against any unwanted intrusion An antivirus will only scan for any harmful programs that are present in the system such as viruses, worms, Trojans etc One of the limitations of a firewall is that it cannot block any internal attacks and also those attacks that bypass its network coverage One of the limitations of an antivirus is that it cannot check read-only files. DEC SEAL was the first commercially viable firewall program that came out in 1992. Its creation was spearheaded by American computer scientists Brian Reed and Jeff Mogul. The first documented removal of a computer virus was by an actual antivirus software was in 1987 when a German computer security expert, Bernard Robert Fix, created a programme to remove a virus that had infected files in a DOS-based system