SlideShare a Scribd company logo
www.studymafia.org
Content
 Introduction
 What is a Firewall
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Content….
 Types
 Basic Concepts of Firewall
 Role of Firewall
 Advantages
 Disadvantages
 Conclusion
Introduction
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.

Recommended for you

Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution

This document presents a project investigating Network Access Control (NAC) as a network security solution. It provides background on NAC, describing how it controls network access through policies that assess devices. The project implements the PacketFence NAC solution in three phases: setting up the network and PacketFence appliance; configuring policies through the web GUI; and testing administration and user access. Other NAC technologies are briefly discussed. The conclusion evaluates PacketFence and the project phases, noting limitations and recommendations.

Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers

This document discusses packet sniffing and methods for detecting packet sniffers. It defines packet sniffing as monitoring all network packets and describes common packet sniffer tools like tcpdump. It explains that packet sniffers can be used for both legitimate and malicious purposes, such as password theft or network mapping. The document outlines two key methods for detecting packet sniffers - MAC detection and DNS detection. MAC detection works by sending packets with invalid MAC addresses and checking if any hosts respond in promiscuous mode. DNS detection exploits the behavior of sniffers performing DNS lookups on spoofed source IP addresses. Both methods were found to accurately detect the presence of packet sniffers on a network.

Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors

This document discusses Trojans, backdoors, and other malware. It begins by explaining the origin of the term "Trojan" from the story of the Trojan horse in Greek mythology. It then defines Trojans and different types like destructive, denial of service, and remote access Trojans. The document also covers how systems can become infected, techniques for detecting and hiding malware like Trojans and backdoors, and discusses the historical Back Orifice 2000 backdoor as a case study. It concludes with recommendations for protecting against malware.

rootkitswormstrojans
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
What is the difference between a host-based firewall
and a network-based firewall?
 A host-based firewall is installed on an individual computer to
protect it from activity occurring on its network.
 A network-based firewall is implemented at a specified point in
the network path and protects all computers on the “internal” side
of the firewall from all computers on the “external” side of the
firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.

Recommended for you

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation

This presentation discusses different types of firewalls and their functions. It begins by defining a firewall as a device or software that controls incoming and outgoing network traffic based on security rules. It then discusses hardware and software firewalls, with hardware firewalls protecting entire networks at the router level while software firewalls protect individual computers. The presentation also covers four main types of firewall techniques: packet filtering, application proxy, stateful inspection, and circuit-level gateways. It concludes by stating that while firewalls provide important security, no single tool can handle all security functions on its own.

firewallhardware firewallsoftware firewall
Firewall
FirewallFirewall
Firewall

A firewall is a system or group of systems that controls network traffic between trusted and untrusted networks according to pre-configured rules. There are different types of firewalls including packet filtering, stateful packet inspection, application-level gateways, and circuit-level gateways. Firewalls work by examining packets and filtering traffic based on criteria like source/destination addresses and ports to enforce a security policy between networks.

Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt

Virtual Private Network is a type of private network that uses public telecommunicaton, such as the Internet, instead of leased lines to communicate

History of Firewalls
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router

Recommended for you

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt

This document provides an overview of firewalls, including what they are, different types, basic concepts, their role, advantages, and disadvantages. It defines a firewall as a program or device that filters network traffic between the internet and a private network based on a set of rules. The document discusses software vs hardware firewalls and different types like packet filtering, application-level gateways, and circuit-level gateways. It also covers the history of firewalls, their design goals, and how they concentrate security and restrict access to trusted machines only.

firewall
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation

Virtual private networks (VPNs) allow users to securely access an organization's intranet from remote locations using public networks like the internet. VPNs use encryption and tunneling protocols to securely transmit data and authenticate users, providing privacy and access similar to a private network. The main benefits of VPNs are reduced costs compared to dedicated private networks, as VPNs can leverage existing broadband internet connections instead of expensive leased lines. Common VPN protocols include PPTP, L2TP, and IPsec, with "tunneling" referring to the encapsulation of packets within other protocol packets to create and maintain virtual connections.

virtualprivatenetwork
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network

Overview of VPN protocols. VPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality. However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet). VPNs basically hook a network logically into another network so that both appear as one private local network. Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network. VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network. The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.

vpnl2fnat-traversal
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
Application-level Gateway
 Also called proxy server
 Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway

Recommended for you

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new

This document discusses firewalls and packet filters. It defines a firewall as a device that provides secure connectivity between networks and can be hardware, software, or a combination. There are two main types of firewalls - hardware and software. It also describes how firewalls and packet filters work, including inspecting packets and applying rules to determine if packets should be allowed through or blocked. The functions of packet filters are to control traffic and provide security. Manufacturing companies that provide firewall and packet filtering solutions are also listed.

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security

Wireless networks allow devices to connect to a wired network without cables. An access point connected to the wired network allows devices like computers and phones to connect wirelessly at broadband speeds. However, wireless networks pose security risks if not configured properly, as unencrypted wireless traffic can be intercepted and users can gain unauthorized access. It is important to set up security measures like access restrictions, encryption, and isolating wireless networks when deploying wireless networks.

dtb
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access

1. Zero Trust Network Access (ZTNA) is a security model that provides secure remote access to applications and services based on defined access policies, unlike VPNs which grant complete network access. 2. ZTNA gives users access only to approved services without placing them on the network or exposing apps to the internet. 3. The document discusses the principles and methodology of ZTNA, including continuous authentication, authorization for every interaction, microsegmentation, and least privilege access.

ztnacybersecuritynetworking
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed
Basic concepts of a firewall
 Source
 Destination
 Service
 Action
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
Advantages of firewall
 Concentration of security all modified software and logging is
located on the firewall system as opposed to being distributed on
many hosts;
 Protocol filtering, where the firewall filters protocols and services
that are either not necessary or that cannot be adequately secured
from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby revealing
less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before connecting
further, thereby filtering the protocol;

Recommended for you

Firewall
Firewall Firewall
Firewall

Hai...!! Here the powerpoint gives you a clear idea about Firewall and its types.. Make use of it..

Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall

Traditional firewalls control traffic entering and exiting a network using stateless or stateful methods. Next-generation firewalls combine traditional firewall features with additional capabilities like deep packet inspection, intrusion prevention, and application awareness. While traditional and next-generation firewalls both provide static packet filtering and stateful inspection, next-generation firewalls offer more advanced protection through deep packet inspection at the application level and integration of outside threat intelligence. The document compares features of leading next-generation firewall vendors Cisco, CheckPoint, Fortinet, WatchGuard and Dell.

firewallngfwnext generation firewall
Network security
Network securityNetwork security
Network security

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized  access, misuse, modification, or denial of a computer network and network-accessible resources

Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
Conclusion
 One of the best things about a firewall from a security standpoint
is that it stops anyone on the outside from logging onto a
computer in your private network.
 While this is a big deal for businesses, most home networks will
probably not be threatened in this manner. Still, putting a firewall
in place provides some peace of mind.
Thanks..!!!

More Related Content

What's hot

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
Conor Ryan
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
Firewall ppt
Firewall pptFirewall ppt
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Firewall
Firewall Firewall
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
美兰 曾
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 

What's hot (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall
FirewallFirewall
Firewall
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Firewall
Firewall Firewall
Firewall
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Network security
Network securityNetwork security
Network security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Similar to Firewall

Firewall
FirewallFirewall
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
Revanth71
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
LakshmiSamivel
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
FirewallFirewall
Firewall
Netwax Lab
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
Anand992498
 
Firewall
FirewallFirewall
Firewall
FirewallFirewall
Firewalls
FirewallsFirewalls
Firewall
FirewallFirewall
Firewall
Kunal Kumar
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Note8
Note8Note8
Firewalls
FirewallsFirewalls
Firewall
FirewallFirewall
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
Firewall
FirewallFirewall
Firewall
Apo
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
BhushanLokhande12
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Firewall
FirewallFirewall
Firewall
Shamima Akther
 

Similar to Firewall (20)

Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
FirewallFirewall
Firewall
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Note8
Note8Note8
Note8
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall
FirewallFirewall
Firewall
 

More from Naga Dinesh

pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
Naga Dinesh
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
Naga Dinesh
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
Naga Dinesh
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
Naga Dinesh
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
Naga Dinesh
 
Tera data
Tera dataTera data
Tera data
Naga Dinesh
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
Naga Dinesh
 
pillcam
pillcampillcam
pillcam
Naga Dinesh
 
team viewer
team viewerteam viewer
team viewer
Naga Dinesh
 
Haptic tech
Haptic techHaptic tech
Haptic tech
Naga Dinesh
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
Naga Dinesh
 
Gifi
GifiGifi
Anjular js
Anjular jsAnjular js
Anjular js
Naga Dinesh
 
brain chip
 brain chip brain chip
brain chip
Naga Dinesh
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
Naga Dinesh
 
mobilejammer
mobilejammermobilejammer
mobilejammer
Naga Dinesh
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
Naga Dinesh
 
5 g technology
5 g technology5 g technology
5 g technology
Naga Dinesh
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
Naga Dinesh
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
Naga Dinesh
 

More from Naga Dinesh (20)

pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
 

Recently uploaded

BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 

Recently uploaded (20)

BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 

Firewall

  • 2. Content  Introduction  What is a Firewall  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 3. Content….  Types  Basic Concepts of Firewall  Role of Firewall  Advantages  Disadvantages  Conclusion
  • 4. Introduction  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 5. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 6. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 7. What is the difference between a host-based firewall and a network-based firewall?  A host-based firewall is installed on an individual computer to protect it from activity occurring on its network.  A network-based firewall is implemented at a specified point in the network path and protects all computers on the “internal” side of the firewall from all computers on the “external” side of the firewall.
  • 8. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 9. History of Firewalls  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 10. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 11. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 12. Types of firewalls  Packet-filtering Router
  • 13. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 14. Types of firewalls…  Application-level Gateway
  • 15. Application-level Gateway  Also called proxy server  Acts as a relay of application-level traffic
  • 16. Types of firewalls…  Circuit-level Gateway
  • 17. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 18. Basic concepts of a firewall  Source  Destination  Service  Action
  • 19. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 20. Advantages of firewall  Concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 21. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.
  • 22. Conclusion  One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network.  While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.