SlideShare a Scribd company logo
1 of 27
Firewalls
Y.Vaishnavi
14311A1202
IT ‘A’
Contents
• Introduction
• History
• Why firewall security
• Types of firewalls
• Working
• Need for firewalls
• Next generation firewall
• Advantages and disadvantages
• Conclusion
Introduction
• A firewall is a network security system, either hardware- or
software-based, that controls incoming and outgoing network
traffic based on a set of rules.
• Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through
the firewall, which examines each message and blocks those
that do not meet the specified security criteria.
Continued…
• In protecting private information,
a firewall is considered a first line
of defense.
• In most server infrastructures,
firewalls provide an essential
layer of security that, combined
with other measures, prevent
attackers from accessing your
servers in malicious ways.
History
• Computer security borrowed the term firewall from
firefighting and fire prevention, where a firewall is a barrier
established to prevent the spread of fire.
• Before firewalls emerged in the late 1980s, the only real form
of network security was performed by access control lists
(ACLs) residing on routers.
• Firewall technology emerged in the late 1980s when the
Internet was a fairly new technology in terms of its global use
and connectivity.
Why firewall security..?
• Remote login
• Application backdoors
• SMTP session hijacking
• Operating system bugs
• Denial of service
• Viruses
Types of firewalls
•Hardware firewalls
•Software firewalls
Hardware firewall
• Hardware firewalls can be purchased as a stand-alone
product but are also typically found in broadband routers,
and should be considered an important part of your system
and network set-up.
• Most hardware firewalls will have a minimum of four network
ports to connect other computers, but for larger networks,
business networking firewall solutions are available.
Software firewall
• Software firewalls are installed on your computer (like any
software) and you can customize it; allowing you some
control over its function and protection features. A software
firewall will protect your computer from outside attempts to
control or gain access your computer.
• New generation Operating systems come with built in
firewalls or you can buy a firewall software for the computer
that accesses the internet or acts as the gateway to your
home network.
Firewall logic
• Firewalls use 3 types of filtering mechanisms:
1. Packet filtering
2. Proxy service
3. Stateful inspection
Packet filtering
Data flow consists of packets of information and
firewalls analyze these packets to sniff out offensive or
unwanted packets depending on what you have defined
as unwanted packets.
 Looks at each packet entering or leaving the network
and accepts or rejects it based on user-defined rules.
Packet filtering is fairly effective and transparent to
users, but it is difficult to configure.
Packet filtering
Proxy service
A proxy server is a type of gateway that hides the true
network address of the computer(s) connecting through it.
 A proxy server connects to the Internet, makes the requests
for pages, connections to servers, etc., and receives the data
on behalf of the computer(s) behind it.
The firewall capabilities lie in the fact that a proxy can be
configured to allow only certain types of traffic to pass
(e.g.,HTTP files, or web pages).
Proxy firewalls are considered to be the most secure type of
firewall because they prevent direct network contact with
other systems.
Firewall proxy servers works at the application layer of the
firewalls ,where both ends of a connection are forced to
conduct a session through the proxy.
Stateful inspection
A newer method that doesn't examine the contents of each
packet but instead compares certain key parts of the packet
to a database of trusted information.
Information traveling from inside the firewall to the outside is
monitored for specific defining characteristics, then incoming
information is compared to these characteristics.
 If the comparison yields a reasonable match, the information
is allowed through. Otherwise it is discarded.
How do Firewalls protect Businesses
• Large corporations often have very complex
firewalls in place to protect their extensive
networks.
• On the outbound side, firewalls can be configured
to prevent employees from sending certain types of
emails or transmitting sensitive data outside of the
network.
• On the inbound side, firewalls can be programmed
to prevent access to certain websites (like social
networking sites).
• A company might choose to designate a single
computer on the network for file sharing and all
other computers could be restricted.
The need of Firewalls for Personal Use
• For home use, firewalls work much more simply.
• The main goal of a personal firewall is to protect your
personal computer and private network from malicious
mischief.
• Viruses are often the first type of malware that can be
transmitted to your computer through email or over the
Internet and can quickly cause a lot of damage to your
files. There are two ways a Firewall can prevent this
from happening.
• It can allow all traffic to pass through except data that
meets a predetermined set of criteria, or it can prohibit
all traffic unless it meets a predetermined set of criteria.
Next generation firewalls
• Today, a new generation of users, applications, and
security threats are posing risk to the enterprise
wireless network.
• Traditional firewalls are not strong enough to
provide complete application visibility and control.
• Next Generation Firewalls allow organizations to
achieve network transparency, reduce
vulnerabilities, and conserve network performance.
Next generation firewalls
• A newer class of firewalls, next generation firewall -
NGFW, filters network and Internet traffic based
upon the applications or traffic types using specific
ports.
• Next Generation Firewalls (NGFWs) blend the
features of a standard firewall with quality of service
(QoS) functionalities in order to provide smarter and
deeper inspection.
Benefits of NGFW
• The 3 great benefits offered by next
generation firewall for your enterprise
wireless network are
1. Application Identification
2. Application Control
3. Threat Prevention
Advantages
• Low cost.
• Packet filters make use of current network routers.
• Makes Security Transparent to End-Users.
• Easy to install. High speed
• Packet filters make use of current network routers. Therefore
implementing a packet filter security system is typically less
complicated than other network security solutions.
• Packet filters are generally faster than other firewall
technologies because they perform fewer evaluations.
Disadvantages
• Packet filtering by a software firewall can degrade your system's
performance, because it's a demanding task to examine every
packet of data.
• Whichever option you choose, configuring and maintaining the
firewall can be a difficult
• A network firewall also can lend users a false sense of security,
encouraging them not to maintain security at the machine level. If
the network firewall fails or is not configured properly, this could
prove disastrous.
• Sometimes difficult to remove or un-install a firewall completely.
Conclusion
• Firewalls are a must have for any kind of computer usage
that go online. They protect you from all kinds of abuse &
unauthorised access like trojans that allow taking control of
your computers by remote logins or backdoors, virus or use
your resources to launch DOS attacks.
• Firewalls are worth installing. Be it a basic standalone
system, a home network or a office network, all face varying
levels of risks & Firewalls do a good job in mitigating these
risks. Tune the firewall for your requirements & security
levels and you have one reason less to worry.
Firewalls

More Related Content

What's hot

Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Firewall
FirewallFirewall
FirewallApo
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systemssamis
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 

What's hot (20)

Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Wireshark
WiresharkWireshark
Wireshark
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Security policies
Security policiesSecurity policies
Security policies
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 

Viewers also liked

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Work factor-Anant Patel
Work factor-Anant PatelWork factor-Anant Patel
Work factor-Anant PatelAnant Patel
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Iso 9000 2000 Internal Audits
Iso 9000 2000 Internal AuditsIso 9000 2000 Internal Audits
Iso 9000 2000 Internal Auditsahmad bassiouny
 
District industries centres(dics)
District industries centres(dics)District industries centres(dics)
District industries centres(dics)Simran Kaur
 
Iso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guideIso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guideHenry Nelson
 
The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)Mallikarjun Hosamani
 
District industrial centre2
District industrial centre2District industrial centre2
District industrial centre2SAi Krishna
 
ISO 9000 : 2000 Outline
ISO 9000 : 2000 OutlineISO 9000 : 2000 Outline
ISO 9000 : 2000 OutlinePhi Jack
 
Basic Occupational Health & Safety
Basic Occupational Health & SafetyBasic Occupational Health & Safety
Basic Occupational Health & Safetysklip
 
ISO 22000 Food Safety Management System
ISO 22000 Food Safety Management SystemISO 22000 Food Safety Management System
ISO 22000 Food Safety Management SystemHenry Nelson
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Six Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandSix Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandAkshay Anand
 

Viewers also liked (20)

Doc iptables-firewall
Doc iptables-firewallDoc iptables-firewall
Doc iptables-firewall
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Web Security
Web SecurityWeb Security
Web Security
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Work factor-Anant Patel
Work factor-Anant PatelWork factor-Anant Patel
Work factor-Anant Patel
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Iso 9000 2000 Internal Audits
Iso 9000 2000 Internal AuditsIso 9000 2000 Internal Audits
Iso 9000 2000 Internal Audits
 
District industries centres(dics)
District industries centres(dics)District industries centres(dics)
District industries centres(dics)
 
Iso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guideIso 22000 2005 food safety management system certification practice guide
Iso 22000 2005 food safety management system certification practice guide
 
The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)The 'District Industries Centre' (DICs)
The 'District Industries Centre' (DICs)
 
District industrial centre2
District industrial centre2District industrial centre2
District industrial centre2
 
Work sampling
Work samplingWork sampling
Work sampling
 
ISO 9000 : 2000 Outline
ISO 9000 : 2000 OutlineISO 9000 : 2000 Outline
ISO 9000 : 2000 Outline
 
District Industrial Centre
District Industrial CentreDistrict Industrial Centre
District Industrial Centre
 
Basic Occupational Health & Safety
Basic Occupational Health & SafetyBasic Occupational Health & Safety
Basic Occupational Health & Safety
 
ISO 22000 Food Safety Management System
ISO 22000 Food Safety Management SystemISO 22000 Food Safety Management System
ISO 22000 Food Safety Management System
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Six Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay AnandSix Sigma - A Presentation by Akshay Anand
Six Sigma - A Presentation by Akshay Anand
 

Similar to Firewalls

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptxLakshayYadav46
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)marghali
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall ppt
Firewall pptFirewall ppt
Firewall pptRevanth71
 

Similar to Firewalls (20)

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Seminar
SeminarSeminar
Seminar
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 

Recently uploaded

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Firewalls

  • 2. Contents • Introduction • History • Why firewall security • Types of firewalls • Working • Need for firewalls • Next generation firewall • Advantages and disadvantages • Conclusion
  • 3. Introduction • A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. • Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. • All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  • 4. Continued… • In protecting private information, a firewall is considered a first line of defense. • In most server infrastructures, firewalls provide an essential layer of security that, combined with other measures, prevent attackers from accessing your servers in malicious ways.
  • 5. History • Computer security borrowed the term firewall from firefighting and fire prevention, where a firewall is a barrier established to prevent the spread of fire. • Before firewalls emerged in the late 1980s, the only real form of network security was performed by access control lists (ACLs) residing on routers. • Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity.
  • 6. Why firewall security..? • Remote login • Application backdoors • SMTP session hijacking • Operating system bugs • Denial of service • Viruses
  • 7. Types of firewalls •Hardware firewalls •Software firewalls
  • 8. Hardware firewall • Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. • Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.
  • 9. Software firewall • Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer. • New generation Operating systems come with built in firewalls or you can buy a firewall software for the computer that accesses the internet or acts as the gateway to your home network.
  • 10.
  • 11. Firewall logic • Firewalls use 3 types of filtering mechanisms: 1. Packet filtering 2. Proxy service 3. Stateful inspection
  • 12. Packet filtering Data flow consists of packets of information and firewalls analyze these packets to sniff out offensive or unwanted packets depending on what you have defined as unwanted packets.  Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure.
  • 14. Proxy service A proxy server is a type of gateway that hides the true network address of the computer(s) connecting through it.  A proxy server connects to the Internet, makes the requests for pages, connections to servers, etc., and receives the data on behalf of the computer(s) behind it. The firewall capabilities lie in the fact that a proxy can be configured to allow only certain types of traffic to pass (e.g.,HTTP files, or web pages). Proxy firewalls are considered to be the most secure type of firewall because they prevent direct network contact with other systems.
  • 15. Firewall proxy servers works at the application layer of the firewalls ,where both ends of a connection are forced to conduct a session through the proxy.
  • 16. Stateful inspection A newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics.  If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded.
  • 17. How do Firewalls protect Businesses • Large corporations often have very complex firewalls in place to protect their extensive networks. • On the outbound side, firewalls can be configured to prevent employees from sending certain types of emails or transmitting sensitive data outside of the network. • On the inbound side, firewalls can be programmed to prevent access to certain websites (like social networking sites). • A company might choose to designate a single computer on the network for file sharing and all other computers could be restricted.
  • 18. The need of Firewalls for Personal Use • For home use, firewalls work much more simply. • The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief. • Viruses are often the first type of malware that can be transmitted to your computer through email or over the Internet and can quickly cause a lot of damage to your files. There are two ways a Firewall can prevent this from happening. • It can allow all traffic to pass through except data that meets a predetermined set of criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria.
  • 19.
  • 20. Next generation firewalls • Today, a new generation of users, applications, and security threats are posing risk to the enterprise wireless network. • Traditional firewalls are not strong enough to provide complete application visibility and control. • Next Generation Firewalls allow organizations to achieve network transparency, reduce vulnerabilities, and conserve network performance.
  • 21. Next generation firewalls • A newer class of firewalls, next generation firewall - NGFW, filters network and Internet traffic based upon the applications or traffic types using specific ports. • Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of service (QoS) functionalities in order to provide smarter and deeper inspection.
  • 22. Benefits of NGFW • The 3 great benefits offered by next generation firewall for your enterprise wireless network are 1. Application Identification 2. Application Control 3. Threat Prevention
  • 23. Advantages • Low cost. • Packet filters make use of current network routers. • Makes Security Transparent to End-Users. • Easy to install. High speed • Packet filters make use of current network routers. Therefore implementing a packet filter security system is typically less complicated than other network security solutions. • Packet filters are generally faster than other firewall technologies because they perform fewer evaluations.
  • 24. Disadvantages • Packet filtering by a software firewall can degrade your system's performance, because it's a demanding task to examine every packet of data. • Whichever option you choose, configuring and maintaining the firewall can be a difficult • A network firewall also can lend users a false sense of security, encouraging them not to maintain security at the machine level. If the network firewall fails or is not configured properly, this could prove disastrous. • Sometimes difficult to remove or un-install a firewall completely.
  • 25.
  • 26. Conclusion • Firewalls are a must have for any kind of computer usage that go online. They protect you from all kinds of abuse & unauthorised access like trojans that allow taking control of your computers by remote logins or backdoors, virus or use your resources to launch DOS attacks. • Firewalls are worth installing. Be it a basic standalone system, a home network or a office network, all face varying levels of risks & Firewalls do a good job in mitigating these risks. Tune the firewall for your requirements & security levels and you have one reason less to worry.