Firewalls Cliff Leach Mike Looney Danny Mar Monty Maughon
What is a firewall and what do we use it for?   <ul><li>Firewalls serve as a barrier between your personal computer and th...
Features of Firewalls <ul><li>Caching </li></ul><ul><li>Address Translation </li></ul><ul><li>Content Restriction </li></ul>
Technical Aspects <ul><li>Advanced Authentication </li></ul><ul><li>Policy </li></ul><ul><li>Packet Filtering </li></ul><u...
How does a firewall work? <ul><li>Exchanging individual “packets” of data </li></ul><ul><li>Destination address and port n...
Basic Firewall Diagram Goncalves,  Firewalls: a Complete Guide , p.255
When do you need a firewall? <ul><li>Computer’s files accessed remotely </li></ul><ul><li>Operating an Internet Server </l...
What is your goal for security measures? <ul><li>Limit users to specific network access </li></ul><ul><li>Regulate incomin...
What kind of firewalls are there? <ul><li>Software and hardware based firewalls </li></ul><ul><li>Hardware networking devi...
Disadvantages of Firewalls <ul><li>Access Restrictions </li></ul><ul><li>Modem Access - Back-door challenges </li></ul><ul...
Firewall Packages <ul><li>McAfee Personal Firewall </li></ul><ul><li>Zone Alarm </li></ul><ul><li>Tiny Personal Firewall v...
Upcoming SlideShare
Loading in …5
×

Firewalls Cliff Leach Mike Looney

348 views
292 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
348
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Firewalls Cliff Leach Mike Looney

  1. 1. Firewalls Cliff Leach Mike Looney Danny Mar Monty Maughon
  2. 2. What is a firewall and what do we use it for? <ul><li>Firewalls serve as a barrier between your personal computer and the outside network (E.G. Internet) </li></ul><ul><li>Helps regulate network flow </li></ul>
  3. 3. Features of Firewalls <ul><li>Caching </li></ul><ul><li>Address Translation </li></ul><ul><li>Content Restriction </li></ul>
  4. 4. Technical Aspects <ul><li>Advanced Authentication </li></ul><ul><li>Policy </li></ul><ul><li>Packet Filtering </li></ul><ul><li>Application Gateways </li></ul>
  5. 5. How does a firewall work? <ul><li>Exchanging individual “packets” of data </li></ul><ul><li>Destination address and port number </li></ul>
  6. 6. Basic Firewall Diagram Goncalves, Firewalls: a Complete Guide , p.255
  7. 7. When do you need a firewall? <ul><li>Computer’s files accessed remotely </li></ul><ul><li>Operating an Internet Server </li></ul><ul><li>Remote Access Program </li></ul><ul><li>Prevention of intrusion </li></ul><ul><li>Trojan horses </li></ul>
  8. 8. What is your goal for security measures? <ul><li>Limit users to specific network access </li></ul><ul><li>Regulate incoming and outgoing traffic </li></ul><ul><li>Monitor traffic on TCP ports </li></ul><ul><li>Keep confidential data safe </li></ul>
  9. 9. What kind of firewalls are there? <ul><li>Software and hardware based firewalls </li></ul><ul><li>Hardware networking devices </li></ul><ul><li>Content filters (E.G., Net Nanny, Bess) </li></ul>
  10. 10. Disadvantages of Firewalls <ul><li>Access Restrictions </li></ul><ul><li>Modem Access - Back-door challenges </li></ul><ul><li>Inside Attacks </li></ul>
  11. 11. Firewall Packages <ul><li>McAfee Personal Firewall </li></ul><ul><li>Zone Alarm </li></ul><ul><li>Tiny Personal Firewall v.2 </li></ul><ul><li>Sygate Personal Firewall Pro 5.0 </li></ul><ul><li>BlackIce Defender </li></ul>

×