SlideShare a Scribd company logo
There is no single security appliance or
piece of technology that will solve all the
network security needs in an organization.
We must consider what tools will be most
effective as part of our security system.
@anantakhare Ananta_khare Anantakhare Anantakhare
 Security appliances can be stand alone
devices like a router or software tools that are
run on network device.
 They fall into six general categories.
@anantakhare Ananta_khare Anantakhare Anantakhare
 While routers are primarily used to
interconnect various network segments
together, they usually also provide basic
traffic filtering capabilities.
 This information can help define which
computers from a given network segments
can communicate with which network
segments.
@anantakhare Ananta_khare Anantakhare Anantakhare
 Firewalls can look deeper into the network
traffic itself and identify malicious behavior
that has to be blocked.
 Firewalls can have sophisticated security
policies applied to the traffic that is passing
through them.
@anantakhare Ananta_khare Anantakhare Anantakhare
 IPS systems use a set of traffic signatures that
match and block malicious traffic and attacks
@anantakhare Ananta_khare Anantakhare Anantakhare
 VPN systems let remote employees use a
secure encrypted tunnel from their mobile
computer and securely connect back to
organization’s network.
 VPN systems can also securely interconnect
branch offices with the central office network.
@anantakhare Ananta_khare Anantakhare Anantakhare
 These systems use signatures or behavioral
analysis of applications to identify and block
malicious code from being executed
@anantakhare Ananta_khare Anantakhare Anantakhare
 Other security devices include web and email
security appliance, decryption devices, client
access control servers and security
management systems.
@anantakhare Ananta_khare Anantakhare Anantakhare
 In computer networking, a firewalls is designed
to control or filter which communication are
allowed out of device or network. A firewalls can
be installed on a single computer (host-based
firewall) or it can be standalone network device
that protects an entire network of computers and
all of the host devices on that network(network-
based firewall)
 A computer and network attacks have become
more sophisticated, new types of firewalls have
developed, which serve different purpose
@anantakhare Ananta_khare Anantakhare Anantakhare
1. Network layer firewall
2. Transport layer firewall
3. Application layer firewall
4. Context aware layer firewall
5. Proxy server
6. Reverse proxy server
7. Network address translation(NAT) firewall
8. Host-based firewall
@anantakhare Ananta_khare Anantakhare Anantakhare
1.Network layer firewall
This filters communications based on
source and destination IP addresses
2.Transport layer firewall
Filters communications based on
source and destination data ports as well as
connection states
3.Application layer firewall
Filters communications based on an
application, program or service.
@anantakhare Ananta_khare Anantakhare Anantakhare
4.Context aware layer firewall
Filter communications based on the
user, device, role, application type and
threat profile.
5. Proxy serer
Filters web content request like
URL’s, domain names and media types.
6.Reverse proxy server
Placed in front of web servers
reveres proxy servers protect, hide, offload
and distribute access to web server.
@anantakhare Ananta_khare Anantakhare Anantakhare
 7.Network address translation (NAT) firewall
This firewall hides or masquerades the
private address of network hosts.
8.Host-based firewall
Filters port and system services calls
on single computer operating system.
@anantakhare Ananta_khare Anantakhare Anantakhare
@anantakhare Ananta_khare Anantakhare Anantakhare

More Related Content

Cybersecurity Devices and Technologies.pptx

  • 1. There is no single security appliance or piece of technology that will solve all the network security needs in an organization. We must consider what tools will be most effective as part of our security system. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 2.  Security appliances can be stand alone devices like a router or software tools that are run on network device.  They fall into six general categories. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 3.  While routers are primarily used to interconnect various network segments together, they usually also provide basic traffic filtering capabilities.  This information can help define which computers from a given network segments can communicate with which network segments. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 4.  Firewalls can look deeper into the network traffic itself and identify malicious behavior that has to be blocked.  Firewalls can have sophisticated security policies applied to the traffic that is passing through them. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 5.  IPS systems use a set of traffic signatures that match and block malicious traffic and attacks @anantakhare Ananta_khare Anantakhare Anantakhare
  • 6.  VPN systems let remote employees use a secure encrypted tunnel from their mobile computer and securely connect back to organization’s network.  VPN systems can also securely interconnect branch offices with the central office network. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 7.  These systems use signatures or behavioral analysis of applications to identify and block malicious code from being executed @anantakhare Ananta_khare Anantakhare Anantakhare
  • 8.  Other security devices include web and email security appliance, decryption devices, client access control servers and security management systems. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 9.  In computer networking, a firewalls is designed to control or filter which communication are allowed out of device or network. A firewalls can be installed on a single computer (host-based firewall) or it can be standalone network device that protects an entire network of computers and all of the host devices on that network(network- based firewall)  A computer and network attacks have become more sophisticated, new types of firewalls have developed, which serve different purpose @anantakhare Ananta_khare Anantakhare Anantakhare
  • 10. 1. Network layer firewall 2. Transport layer firewall 3. Application layer firewall 4. Context aware layer firewall 5. Proxy server 6. Reverse proxy server 7. Network address translation(NAT) firewall 8. Host-based firewall @anantakhare Ananta_khare Anantakhare Anantakhare
  • 11. 1.Network layer firewall This filters communications based on source and destination IP addresses 2.Transport layer firewall Filters communications based on source and destination data ports as well as connection states 3.Application layer firewall Filters communications based on an application, program or service. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 12. 4.Context aware layer firewall Filter communications based on the user, device, role, application type and threat profile. 5. Proxy serer Filters web content request like URL’s, domain names and media types. 6.Reverse proxy server Placed in front of web servers reveres proxy servers protect, hide, offload and distribute access to web server. @anantakhare Ananta_khare Anantakhare Anantakhare
  • 13.  7.Network address translation (NAT) firewall This firewall hides or masquerades the private address of network hosts. 8.Host-based firewall Filters port and system services calls on single computer operating system. @anantakhare Ananta_khare Anantakhare Anantakhare