SlideShare une entreprise Scribd logo
1  sur  27
Firewalls
Y.Vaishnavi
14311A1202
IT ‘A’
Contents
• Introduction
• History
• Why firewall security
• Types of firewalls
• Working
• Need for firewalls
• Next generation firewall
• Advantages and disadvantages
• Conclusion
Introduction
• A firewall is a network security system, either hardware- or
software-based, that controls incoming and outgoing network
traffic based on a set of rules.
• Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through
the firewall, which examines each message and blocks those
that do not meet the specified security criteria.
Continued…
• In protecting private information,
a firewall is considered a first line
of defense.
• In most server infrastructures,
firewalls provide an essential
layer of security that, combined
with other measures, prevent
attackers from accessing your
servers in malicious ways.
History
• Computer security borrowed the term firewall from
firefighting and fire prevention, where a firewall is a barrier
established to prevent the spread of fire.
• Before firewalls emerged in the late 1980s, the only real form
of network security was performed by access control lists
(ACLs) residing on routers.
• Firewall technology emerged in the late 1980s when the
Internet was a fairly new technology in terms of its global use
and connectivity.
Why firewall security..?
• Remote login
• Application backdoors
• SMTP session hijacking
• Operating system bugs
• Denial of service
• Viruses
Types of firewalls
•Hardware firewalls
•Software firewalls
Hardware firewall
• Hardware firewalls can be purchased as a stand-alone
product but are also typically found in broadband routers,
and should be considered an important part of your system
and network set-up.
• Most hardware firewalls will have a minimum of four network
ports to connect other computers, but for larger networks,
business networking firewall solutions are available.
Software firewall
• Software firewalls are installed on your computer (like any
software) and you can customize it; allowing you some
control over its function and protection features. A software
firewall will protect your computer from outside attempts to
control or gain access your computer.
• New generation Operating systems come with built in
firewalls or you can buy a firewall software for the computer
that accesses the internet or acts as the gateway to your
home network.
Firewall logic
• Firewalls use 3 types of filtering mechanisms:
1. Packet filtering
2. Proxy service
3. Stateful inspection
Packet filtering
Data flow consists of packets of information and
firewalls analyze these packets to sniff out offensive or
unwanted packets depending on what you have defined
as unwanted packets.
 Looks at each packet entering or leaving the network
and accepts or rejects it based on user-defined rules.
Packet filtering is fairly effective and transparent to
users, but it is difficult to configure.
Packet filtering
Proxy service
A proxy server is a type of gateway that hides the true
network address of the computer(s) connecting through it.
 A proxy server connects to the Internet, makes the requests
for pages, connections to servers, etc., and receives the data
on behalf of the computer(s) behind it.
The firewall capabilities lie in the fact that a proxy can be
configured to allow only certain types of traffic to pass
(e.g.,HTTP files, or web pages).
Proxy firewalls are considered to be the most secure type of
firewall because they prevent direct network contact with
other systems.
Firewall proxy servers works at the application layer of the
firewalls ,where both ends of a connection are forced to
conduct a session through the proxy.
Stateful inspection
A newer method that doesn't examine the contents of each
packet but instead compares certain key parts of the packet
to a database of trusted information.
Information traveling from inside the firewall to the outside is
monitored for specific defining characteristics, then incoming
information is compared to these characteristics.
 If the comparison yields a reasonable match, the information
is allowed through. Otherwise it is discarded.
How do Firewalls protect Businesses
• Large corporations often have very complex
firewalls in place to protect their extensive
networks.
• On the outbound side, firewalls can be configured
to prevent employees from sending certain types of
emails or transmitting sensitive data outside of the
network.
• On the inbound side, firewalls can be programmed
to prevent access to certain websites (like social
networking sites).
• A company might choose to designate a single
computer on the network for file sharing and all
other computers could be restricted.
The need of Firewalls for Personal Use
• For home use, firewalls work much more simply.
• The main goal of a personal firewall is to protect your
personal computer and private network from malicious
mischief.
• Viruses are often the first type of malware that can be
transmitted to your computer through email or over the
Internet and can quickly cause a lot of damage to your
files. There are two ways a Firewall can prevent this
from happening.
• It can allow all traffic to pass through except data that
meets a predetermined set of criteria, or it can prohibit
all traffic unless it meets a predetermined set of criteria.
Next generation firewalls
• Today, a new generation of users, applications, and
security threats are posing risk to the enterprise
wireless network.
• Traditional firewalls are not strong enough to
provide complete application visibility and control.
• Next Generation Firewalls allow organizations to
achieve network transparency, reduce
vulnerabilities, and conserve network performance.
Next generation firewalls
• A newer class of firewalls, next generation firewall -
NGFW, filters network and Internet traffic based
upon the applications or traffic types using specific
ports.
• Next Generation Firewalls (NGFWs) blend the
features of a standard firewall with quality of service
(QoS) functionalities in order to provide smarter and
deeper inspection.
Benefits of NGFW
• The 3 great benefits offered by next
generation firewall for your enterprise
wireless network are
1. Application Identification
2. Application Control
3. Threat Prevention
Advantages
• Low cost.
• Packet filters make use of current network routers.
• Makes Security Transparent to End-Users.
• Easy to install. High speed
• Packet filters make use of current network routers. Therefore
implementing a packet filter security system is typically less
complicated than other network security solutions.
• Packet filters are generally faster than other firewall
technologies because they perform fewer evaluations.
Disadvantages
• Packet filtering by a software firewall can degrade your system's
performance, because it's a demanding task to examine every
packet of data.
• Whichever option you choose, configuring and maintaining the
firewall can be a difficult
• A network firewall also can lend users a false sense of security,
encouraging them not to maintain security at the machine level. If
the network firewall fails or is not configured properly, this could
prove disastrous.
• Sometimes difficult to remove or un-install a firewall completely.
Conclusion
• Firewalls are a must have for any kind of computer usage
that go online. They protect you from all kinds of abuse &
unauthorised access like trojans that allow taking control of
your computers by remote logins or backdoors, virus or use
your resources to launch DOS attacks.
• Firewalls are worth installing. Be it a basic standalone
system, a home network or a office network, all face varying
levels of risks & Firewalls do a good job in mitigating these
risks. Tune the firewall for your requirements & security
levels and you have one reason less to worry.
Firewalls

Contenu connexe

Tendances (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
Firewall Firewall
Firewall
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls
FirewallsFirewalls
Firewalls
 
Software security
Software securitySoftware security
Software security
 
Firewall
FirewallFirewall
Firewall
 
FireWall
FireWallFireWall
FireWall
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

En vedette

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Work factor-Anant Patel
Work factor-Anant PatelWork factor-Anant Patel
Work factor-Anant PatelAnant Patel
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Iso 9000 2000 Internal Audits
Iso 9000 2000 Internal AuditsIso 9000 2000 Internal Audits
Iso 9000 2000 Internal Auditsahmad bassiouny
 
District industries centres(dics)
District industries centres(dics)District industries centres(dics)
District industries centres(dics)Simran Kaur
 
Iso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guideIso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guideHenry Nelson
 
The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)Mallikarjun Hosamani
 
District industrial centre2
District industrial centre2District industrial centre2
District industrial centre2SAi Krishna
 
ISO 9000 : 2000 Outline
ISO 9000 : 2000 OutlineISO 9000 : 2000 Outline
ISO 9000 : 2000 OutlinePhi Jack
 
Basic Occupational Health & Safety
Basic Occupational Health & SafetyBasic Occupational Health & Safety
Basic Occupational Health & Safetysklip
 
ISO 22000 Food Safety Management System
ISO 22000 Food Safety Management SystemISO 22000 Food Safety Management System
ISO 22000 Food Safety Management SystemHenry Nelson
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Six Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandSix Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandAkshay Anand
 

En vedette (20)

Doc iptables-firewall
Doc iptables-firewallDoc iptables-firewall
Doc iptables-firewall
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Web Security
Web SecurityWeb Security
Web Security
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Work factor-Anant Patel
Work factor-Anant PatelWork factor-Anant Patel
Work factor-Anant Patel
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Iso 9000 2000 Internal Audits
Iso 9000 2000 Internal AuditsIso 9000 2000 Internal Audits
Iso 9000 2000 Internal Audits
 
District industries centres(dics)
District industries centres(dics)District industries centres(dics)
District industries centres(dics)
 
Iso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guideIso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guide
 
The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)
 
District industrial centre2
District industrial centre2District industrial centre2
District industrial centre2
 
Work sampling
Work samplingWork sampling
Work sampling
 
ISO 9000 : 2000 Outline
ISO 9000 : 2000 OutlineISO 9000 : 2000 Outline
ISO 9000 : 2000 Outline
 
District Industrial Centre
District Industrial CentreDistrict Industrial Centre
District Industrial Centre
 
Basic Occupational Health & Safety
Basic Occupational Health & SafetyBasic Occupational Health & Safety
Basic Occupational Health & Safety
 
ISO 22000 Food Safety Management System
ISO 22000 Food Safety Management SystemISO 22000 Food Safety Management System
ISO 22000 Food Safety Management System
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Six Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandSix Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay Anand
 

Similaire à Firewalls

Similaire à Firewalls (20)

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Seminar
SeminarSeminar
Seminar
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall
FirewallFirewall
Firewall
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 

Dernier

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 

Dernier (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Firewalls

  • 2. Contents • Introduction • History • Why firewall security • Types of firewalls • Working • Need for firewalls • Next generation firewall • Advantages and disadvantages • Conclusion
  • 3. Introduction • A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. • Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. • All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  • 4. Continued… • In protecting private information, a firewall is considered a first line of defense. • In most server infrastructures, firewalls provide an essential layer of security that, combined with other measures, prevent attackers from accessing your servers in malicious ways.
  • 5. History • Computer security borrowed the term firewall from firefighting and fire prevention, where a firewall is a barrier established to prevent the spread of fire. • Before firewalls emerged in the late 1980s, the only real form of network security was performed by access control lists (ACLs) residing on routers. • Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity.
  • 6. Why firewall security..? • Remote login • Application backdoors • SMTP session hijacking • Operating system bugs • Denial of service • Viruses
  • 7. Types of firewalls •Hardware firewalls •Software firewalls
  • 8. Hardware firewall • Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. • Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.
  • 9. Software firewall • Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer. • New generation Operating systems come with built in firewalls or you can buy a firewall software for the computer that accesses the internet or acts as the gateway to your home network.
  • 10.
  • 11. Firewall logic • Firewalls use 3 types of filtering mechanisms: 1. Packet filtering 2. Proxy service 3. Stateful inspection
  • 12. Packet filtering Data flow consists of packets of information and firewalls analyze these packets to sniff out offensive or unwanted packets depending on what you have defined as unwanted packets.  Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure.
  • 14. Proxy service A proxy server is a type of gateway that hides the true network address of the computer(s) connecting through it.  A proxy server connects to the Internet, makes the requests for pages, connections to servers, etc., and receives the data on behalf of the computer(s) behind it. The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types of traffic to pass (e.g.,HTTP files, or web pages). Proxy firewalls are considered to be the most secure type of firewall because they prevent direct network contact with other systems.
  • 15. Firewall proxy servers works at the application layer of the firewalls ,where both ends of a connection are forced to conduct a session through the proxy.
  • 16. Stateful inspection A newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics.  If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded.
  • 17. How do Firewalls protect Businesses • Large corporations often have very complex firewalls in place to protect their extensive networks. • On the outbound side, firewalls can be configured to prevent employees from sending certain types of emails or transmitting sensitive data outside of the network. • On the inbound side, firewalls can be programmed to prevent access to certain websites (like social networking sites). • A company might choose to designate a single computer on the network for file sharing and all other computers could be restricted.
  • 18. The need of Firewalls for Personal Use • For home use, firewalls work much more simply. • The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief. • Viruses are often the first type of malware that can be transmitted to your computer through email or over the Internet and can quickly cause a lot of damage to your files. There are two ways a Firewall can prevent this from happening. • It can allow all traffic to pass through except data that meets a predetermined set of criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria.
  • 19.
  • 20. Next generation firewalls • Today, a new generation of users, applications, and security threats are posing risk to the enterprise wireless network. • Traditional firewalls are not strong enough to provide complete application visibility and control. • Next Generation Firewalls allow organizations to achieve network transparency, reduce vulnerabilities, and conserve network performance.
  • 21. Next generation firewalls • A newer class of firewalls, next generation firewall - NGFW, filters network and Internet traffic based upon the applications or traffic types using specific ports. • Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of service (QoS) functionalities in order to provide smarter and deeper inspection.
  • 22. Benefits of NGFW • The 3 great benefits offered by next generation firewall for your enterprise wireless network are 1. Application Identification 2. Application Control 3. Threat Prevention
  • 23. Advantages • Low cost. • Packet filters make use of current network routers. • Makes Security Transparent to End-Users. • Easy to install. High speed • Packet filters make use of current network routers. Therefore implementing a packet filter security system is typically less complicated than other network security solutions. • Packet filters are generally faster than other firewall technologies because they perform fewer evaluations.
  • 24. Disadvantages • Packet filtering by a software firewall can degrade your system's performance, because it's a demanding task to examine every packet of data. • Whichever option you choose, configuring and maintaining the firewall can be a difficult • A network firewall also can lend users a false sense of security, encouraging them not to maintain security at the machine level. If the network firewall fails or is not configured properly, this could prove disastrous. • Sometimes difficult to remove or un-install a firewall completely.
  • 25.
  • 26. Conclusion • Firewalls are a must have for any kind of computer usage that go online. They protect you from all kinds of abuse & unauthorised access like trojans that allow taking control of your computers by remote logins or backdoors, virus or use your resources to launch DOS attacks. • Firewalls are worth installing. Be it a basic standalone system, a home network or a office network, all face varying levels of risks & Firewalls do a good job in mitigating these risks. Tune the firewall for your requirements & security levels and you have one reason less to worry.