SlideShare a Scribd company logo
Lakshmi.S, MCA, M.Phil,
Assistant Professor, Dept. of Computer, Science,
Sri Adi Chunchanagiri Women’s College, Cumbum.
Content
 Introduction
 What is a Firewall
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Content….
 Types
 Basic Concepts of Firewall
 Role of Firewall
 Advantages
 Disadvantages
 Conclusion
Introduction
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.

Recommended for you

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system

It's power-point presentation on software application that monitors a network or systems for malicious activity or policy violations.

networkinginformation securityinformation technology
Firewall
FirewallFirewall
Firewall

A firewall is a system or group of systems that controls network traffic between trusted and untrusted networks according to pre-configured rules. There are different types of firewalls including packet filtering, stateful packet inspection, application-level gateways, and circuit-level gateways. Firewalls work by examining packets and filtering traffic based on criteria like source/destination addresses and ports to enforce a security policy between networks.

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation

A firewall is a device or software that provides secure connectivity between internal and external networks by protecting confidential information from unauthorized access, and defending the network and its resources from malicious external users and accidents. There are two main types of firewalls - hardware firewalls which are physical devices that can protect an entire network but are more expensive and complex, and software firewalls which protect individual computers and are cheaper and simpler to configure. Firewall techniques include packet filtering, application gateways, proxy servers, circuit-level gateways, and bastion hosts.

#tayaba #firewall
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
What is the difference between a host-based firewall
and a network-based firewall?
 A host-based firewall is installed on an individual computer to
protect it from activity occurring on its network.
 A network-based firewall is implemented at a specified point in
the network path and protects all computers on the “internal” side
of the firewall from all computers on the “external” side of the
firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.

Recommended for you

Email Analysis
Email AnalysisEmail Analysis
Email Analysis

E-mail messages can be saved either on the client side in file formats like .pst, .ost, .mbx, and .dbx, or left on the server. Files saved on the client side, like a hidden .pst file, could contain incriminating evidence not found by simply looking in an email client like Outlook. Server logs and files can also be examined to trace the origin of emails and investigate email traffic and transactions.

Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network

This document discusses firewall security in computer networks. It begins by asking what a firewall is, why you need one, and the types and methods of delivering firewalls. It then defines a firewall as a tool that filters network traffic and separates nodes. Firewalls are used to protect devices from unauthorized access and malware while allowing legitimate use. The document outlines the main types of firewalls as packet filtering, circuit gateways, stateful inspection, and proxy firewalls. It also discusses software, hardware, and cloud methods of firewall delivery. In the end, it recommends considering network needs and the performance impact of basic versus more advanced firewall options.

computerinternet marketingmba
Firewall
FirewallFirewall
Firewall

This document provides an overview of firewalls, including what they are, how they work, types of firewalls, and their history. A firewall is a program or device that filters network traffic between the internet and an internal network based on a set of rules. There are different types, including packet filtering routers, application-level gateways, and circuit-level gateways. Firewalls aim to only allow authorized traffic according to a security policy while protecting internal systems. They provide advantages such as restricting access and hiding internal network information but can also limit some network connectivity.

harry@platiii...
History of Firewalls
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router

Recommended for you

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits

Cyberoam offers next-generation firewall and UTM firewall that provide stateful and deep packet inspection for network, application and user identity-based security. Cyberoam firewall appliances provide ease of management and high security with flexibility.

network firewall
Firewall
FirewallFirewall
Firewall

Firewalls act as a barrier between an internal network and external networks like the internet to enforce security policies and control access. They work by filtering traffic passing through them based on criteria like source/destination addresses and ports, and can block unauthorized access while allowing permitted services. The document discusses the need for firewalls, how they function, common types like filter-based, proxy-based and stateful inspection firewalls, and what threats they help protect against while also noting some limitations.

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt

This document provides an overview of firewalls, including what they are, different types, basic concepts, their role, advantages, and disadvantages. It defines a firewall as a program or device that filters network traffic between the internet and a private network based on a set of rules. The document discusses software vs hardware firewalls and different types like packet filtering, application-level gateways, and circuit-level gateways. It also covers the history of firewalls, their design goals, and how they concentrate security and restrict access to trusted machines only.

firewall
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
• Also called proxy server
• Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed

Recommended for you

Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN

A VPN creates a secure connection over a public network like the Internet by tunneling link layer protocols. It allows remote users to access private networks. VPNs provide security by using an encrypted connection with another IP address and separating IP traffic. Key functions include authentication, access control, confidentiality, and ensuring data integrity. Common protocols are PPTP, L2TP, IPsec, and SSL/TLS.

networkvpntechnology
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall

firewall is a network is used to block certain types of network traffic. Firewall forms a barrier between a trusted and untrusted network.

firewall-network security| types of firewall
Network Security
Network SecurityNetwork Security
Network Security

While computer systems today have some of the best security systems ever, they are more vulnerable than ever before. This vulnerability stems from the world-wide access to computer systems via the Internet. Computer and network security comes in many forms, including encryption algorithms, access to facilities, digital signatures, and using fingerprints and face scans as passwords.

 
by MAJU
Basic concepts of a firewall
 Source
 Destination
 Service
 Action
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
Advantages of firewall
 Concentration of security all modified software and logging is
located on the firewall system as opposed to being distributed on
many hosts;
 Protocol filtering, where the firewall filters protocols and services
that are either not necessary or that cannot be adequately secured
from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby revealing
less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before connecting
further, thereby filtering the protocol;
Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.

Recommended for you

Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security

This document discusses different types of firewalls and how they work. It begins by explaining that firewalls come in many shapes and sizes, and sometimes a firewall is a collection of computers. All communication must pass through the firewall. It then discusses packet filters, stateful packet inspection engines, application gateways, and circuit-level gateways. Packet filters use transport layer information like IP addresses and port numbers to filter traffic. Stateful packet filters track client-server sessions to match return packets. Application gateways run proxy programs that filter traffic at the application layer. Circuit-level gateways filter traffic at the circuit level. A combination of these is known as a dynamic packet filter. The document also discusses additional firewall functions like network address

network security
Firewall protection
Firewall protectionFirewall protection
Firewall protection

A firewall is hardware or software that filters network traffic by allowing or denying transmission based on a set of rules to protect networks from unauthorized access. There are two main types - network layer firewalls which filter at the IP address and port level, and application layer firewalls which can filter traffic from specific applications like FTP or HTTP. A DMZ (demilitarized zone) is a physical or logical sub-network exposed to an untrusted network like the internet that contains external-facing services, protected from internal networks by firewalls. Firewalls provide security benefits like restricting access to authorized users and preventing intrusions from untrusted networks.

[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf

A firewall is a system designed to restrict access between networks and protect private network resources. It imposes a gateway machine between the outside world and private network that software uses to decide whether to allow or reject incoming traffic. Firewalls implement security policies at a single point and monitor security events while providing strong authentication and allowing virtual private networks on a specially hardened operating system. Common types include packet filtering routers, application-level gateways, and circuit-level gateways, with hybrid firewalls combining techniques.

securityinformationinformation technology
Thanks..!!!

More Related Content

What's hot

Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall
Firewall Firewall
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Email Analysis
Email AnalysisEmail Analysis
Email Analysis
primeteacher32
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
poorvavyas4
 
Firewall
FirewallFirewall
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
Anthony Daniel
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Firewall ppt
Firewall pptFirewall ppt
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
Farah M. Altufaili
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
BharathiKrishna6
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
Firewall
FirewallFirewall
Firewall
Mudasser Afzal
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 

What's hot (20)

Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
Firewall Firewall
Firewall
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Email Analysis
Email AnalysisEmail Analysis
Email Analysis
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
FirewallFirewall
Firewall
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Similar to Firewall ppt

Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
Revanth71
 
Firewall
FirewallFirewall
Firewall
Kunal Kumar
 
Firewall
FirewallFirewall
Firewall
Netwax Lab
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Firewall
FirewallFirewall
Firewall
FirewallFirewall
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
Anand992498
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
Saikiran Panjala
 
169
169169
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewalls
FirewallsFirewalls
Firewalls
Sonali Parab
 
Firewalls
FirewallsFirewalls
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
Firewall
FirewallFirewall
Firewall
Apo
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
abdul talha
 

Similar to Firewall ppt (20)

Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
169
169169
169
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall
FirewallFirewall
Firewall
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 

More from LakshmiSamivel

Greedy Algorithm for Computer Science.ppt
Greedy Algorithm for Computer Science.pptGreedy Algorithm for Computer Science.ppt
Greedy Algorithm for Computer Science.ppt
LakshmiSamivel
 
General methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptxGeneral methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptx
LakshmiSamivel
 
DIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptx
DIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptxDIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptx
DIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptx
LakshmiSamivel
 
DataSructure-Time and Space Complexity.pptx
DataSructure-Time and Space Complexity.pptxDataSructure-Time and Space Complexity.pptx
DataSructure-Time and Space Complexity.pptx
LakshmiSamivel
 
Basic Queue Operation in DataStructure.pptx
Basic Queue Operation in DataStructure.pptxBasic Queue Operation in DataStructure.pptx
Basic Queue Operation in DataStructure.pptx
LakshmiSamivel
 
Presentation DM.pptx
Presentation DM.pptxPresentation DM.pptx
Presentation DM.pptx
LakshmiSamivel
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
LakshmiSamivel
 
Formatting tags
Formatting tagsFormatting tags
Formatting tags
LakshmiSamivel
 
Classification of datastructure.ppt
Classification of datastructure.pptClassification of datastructure.ppt
Classification of datastructure.ppt
LakshmiSamivel
 
Top down parsing
Top down parsingTop down parsing
Top down parsing
LakshmiSamivel
 
Semaphore
Semaphore Semaphore
Semaphore
LakshmiSamivel
 
View
ViewView
Procedures andcursors
Procedures andcursorsProcedures andcursors
Procedures andcursors
LakshmiSamivel
 
Computer network notes
Computer network notesComputer network notes
Computer network notes
LakshmiSamivel
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
LakshmiSamivel
 

More from LakshmiSamivel (15)

Greedy Algorithm for Computer Science.ppt
Greedy Algorithm for Computer Science.pptGreedy Algorithm for Computer Science.ppt
Greedy Algorithm for Computer Science.ppt
 
General methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptxGeneral methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptx
 
DIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptx
DIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptxDIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptx
DIVIDE AND CONQUERMETHOD IN DATASTRUCTURE.pptx
 
DataSructure-Time and Space Complexity.pptx
DataSructure-Time and Space Complexity.pptxDataSructure-Time and Space Complexity.pptx
DataSructure-Time and Space Complexity.pptx
 
Basic Queue Operation in DataStructure.pptx
Basic Queue Operation in DataStructure.pptxBasic Queue Operation in DataStructure.pptx
Basic Queue Operation in DataStructure.pptx
 
Presentation DM.pptx
Presentation DM.pptxPresentation DM.pptx
Presentation DM.pptx
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
 
Formatting tags
Formatting tagsFormatting tags
Formatting tags
 
Classification of datastructure.ppt
Classification of datastructure.pptClassification of datastructure.ppt
Classification of datastructure.ppt
 
Top down parsing
Top down parsingTop down parsing
Top down parsing
 
Semaphore
Semaphore Semaphore
Semaphore
 
View
ViewView
View
 
Procedures andcursors
Procedures andcursorsProcedures andcursors
Procedures andcursors
 
Computer network notes
Computer network notesComputer network notes
Computer network notes
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 

Recently uploaded

NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
MichelleDeLaCruz93
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
MJDuyan
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Neny Isharyanti
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 
National Learning Camp( Reading Intervention for grade1)
National Learning Camp( Reading Intervention for grade1)National Learning Camp( Reading Intervention for grade1)
National Learning Camp( Reading Intervention for grade1)
SaadaGrijaldo1
 
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesArdra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Astro Pathshala
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
Celine George
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
Paul Bradshaw
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
lakitawilson
 
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
thanhluan21
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 
How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17
Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
Celine George
 
The membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERPThe membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERP
Celine George
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
EduSkills OECD
 

Recently uploaded (20)

NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
National Learning Camp( Reading Intervention for grade1)
National Learning Camp( Reading Intervention for grade1)National Learning Camp( Reading Intervention for grade1)
National Learning Camp( Reading Intervention for grade1)
 
“A NOSSA CA(U)SA”. .
“A NOSSA CA(U)SA”.                      .“A NOSSA CA(U)SA”.                      .
“A NOSSA CA(U)SA”. .
 
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesArdra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
Ardra Nakshatra (आर्द्रा): Understanding its Effects and Remedies
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
 
No, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalismNo, it's not a robot: prompt writing for investigative journalism
No, it's not a robot: prompt writing for investigative journalism
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
NAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource BookNAEYC Code of Ethical Conduct Resource Book
NAEYC Code of Ethical Conduct Resource Book
 
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY N...
 
2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
 
How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
 
The membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERPThe membership Module in the Odoo 17 ERP
The membership Module in the Odoo 17 ERP
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
 

Firewall ppt

  • 1. Lakshmi.S, MCA, M.Phil, Assistant Professor, Dept. of Computer, Science, Sri Adi Chunchanagiri Women’s College, Cumbum.
  • 2. Content  Introduction  What is a Firewall  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 3. Content….  Types  Basic Concepts of Firewall  Role of Firewall  Advantages  Disadvantages  Conclusion
  • 4. Introduction  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 5. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 6. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 7. What is the difference between a host-based firewall and a network-based firewall?  A host-based firewall is installed on an individual computer to protect it from activity occurring on its network.  A network-based firewall is implemented at a specified point in the network path and protects all computers on the “internal” side of the firewall from all computers on the “external” side of the firewall.
  • 8. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 9. History of Firewalls  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 10. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 11. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 12. Types of firewalls  Packet-filtering Router
  • 13. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 14. Types of firewalls…  Application-level Gateway • Also called proxy server • Acts as a relay of application-level traffic
  • 15. Types of firewalls…  Circuit-level Gateway
  • 16. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 17. Basic concepts of a firewall  Source  Destination  Service  Action
  • 18. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 19. Advantages of firewall  Concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 20. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.