SlideShare a Scribd company logo
1 of 20
Security Benefits of Firewall
Protection
The primary approach of using a Firewall
is to deal with numerous point regarding
security of your Server or Host.
•A Firewall imposes
restrictions on incoming and
outgoing packets to and from
the private network.
•All the traffic, whether
incoming or outgoing, must
pass through the firewall, and
only authorized traffic is
allowed to pass through it.
Some of the segments that covers
under these benefits are:
1. Overall Controlled Access to
Site Systems
•A Firewall act as a barrier to control access over to a site
system.
•This can be explained by the example that if some host
can be made reachable from outside networks, whereas
others can be effectively sealed off from unwanted
access.
•A site could prevent outside access to its hosts except for
special cases such as mail servers or information servers.
•Thus providing a filtering system which enables only
those that meet the access policy.
2. Concentrated Security
•A Firewall remains the better choice for organizations
willing to cut costs on their security mechanism.
•Simply put, it becomes easier to set unique security
credentials on the Firewall itself, and it works on all
systems accessing the network.
•Firewall is also a better option because it requires less
installation and maintenance costs, unlike other solutions.
•Despite of the fact that Kerberos and other security
mechanisms have their added benefits over Firewall, the
letter one remains more popular due to its simplicity,
specialization and less costs.
3. Enhance System Privacy
•Privacy is one of the crucial factors that must be taken
care as innocuous information might contain clue that
termed to be very helpful to hackers or attackers.
•Since to overcome these factors and grab a much
effective security value, a Firewall comes in action.
•They help in blocking services that can be helped in leaking
this information such as finger and Domain Name Service.
•These Firewalls can also be used to block DNS information
about site systems, thus the names and IP addresses of site
systems would not be available to Internet hosts.
4. Shield from Network Misuse,
Policy Enforcement
•A Firewall can be very beneficial if it was used as a filter
towards all of the internet access to and from the system
passes through it.
•The firewall can log accesses and provide valuable
statistics about network usage.
•It is very beneficial to collect network usage statistics and
evidence of probing for a number of reasons.
•One of the primary importance is knowing whether the
firewall is withstanding probes and attacks, and
determining whether the controls on the firewall are
adequate thus helping in maintaining risk factors.
5. Defending Vulnerable
Services
•A Firewall can enhance network security and reduce
risks to hosts by filtering inherently insecure services.
•As a result, the subnet gets shield from all of the risks, as
only selected protocols will be able to pass through the
Firewall.
•A Firewall could block any vulnerable services such as
NFS from entering or leaving a subnet.
•A Firewall could reject all source-routed packets and
ICMP redirects and then inform administrators of the
incidents.
A Linux Firewall acts as a shield for your system through
five different stages, from the time it's installed on your
computer to the appearance of the ransom warning on your
screen.
CONCLUSION:

More Related Content

What's hot

Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
Md Shihab
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
Sapna Kumari
 
Firewall
FirewallFirewall
Firewall
Apo
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 

What's hot (20)

firewall
firewallfirewall
firewall
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall
FirewallFirewall
Firewall
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall
FirewallFirewall
Firewall
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 

Similar to Security Benefits of Firewall Protection

BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
limsh
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
pg13tarun_g
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 

Similar to Security Benefits of Firewall Protection (20)

firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Seminar
SeminarSeminar
Seminar
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
What is the Importance of a Firewall as a Security Solution?
What is the Importance of a Firewall as a Security Solution?What is the Importance of a Firewall as a Security Solution?
What is the Importance of a Firewall as a Security Solution?
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
fire walls
fire wallsfire walls
fire walls
 
Firewall
FirewallFirewall
Firewall
 
Lessson 2
Lessson 2Lessson 2
Lessson 2
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 

More from david rom

More from david rom (7)

Signs and Symptoms of Recurrent Respiratory Papillomatosis
Signs and Symptoms of Recurrent Respiratory PapillomatosisSigns and Symptoms of Recurrent Respiratory Papillomatosis
Signs and Symptoms of Recurrent Respiratory Papillomatosis
 
Unlocking the Mystery: Understanding TMJ Disorders
Unlocking the Mystery: Understanding TMJ DisordersUnlocking the Mystery: Understanding TMJ Disorders
Unlocking the Mystery: Understanding TMJ Disorders
 
Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?
 
A Guide on Top Linux Distribution in 2016
A Guide on Top Linux Distribution in 2016A Guide on Top Linux Distribution in 2016
A Guide on Top Linux Distribution in 2016
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and DemeritsSignature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
 

Recently uploaded

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 

Recently uploaded (20)

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 

Security Benefits of Firewall Protection

  • 1. Security Benefits of Firewall Protection
  • 2. The primary approach of using a Firewall is to deal with numerous point regarding security of your Server or Host.
  • 3. •A Firewall imposes restrictions on incoming and outgoing packets to and from the private network. •All the traffic, whether incoming or outgoing, must pass through the firewall, and only authorized traffic is allowed to pass through it.
  • 4. Some of the segments that covers under these benefits are:
  • 5. 1. Overall Controlled Access to Site Systems
  • 6. •A Firewall act as a barrier to control access over to a site system. •This can be explained by the example that if some host can be made reachable from outside networks, whereas others can be effectively sealed off from unwanted access.
  • 7. •A site could prevent outside access to its hosts except for special cases such as mail servers or information servers. •Thus providing a filtering system which enables only those that meet the access policy.
  • 9. •A Firewall remains the better choice for organizations willing to cut costs on their security mechanism. •Simply put, it becomes easier to set unique security credentials on the Firewall itself, and it works on all systems accessing the network.
  • 10. •Firewall is also a better option because it requires less installation and maintenance costs, unlike other solutions. •Despite of the fact that Kerberos and other security mechanisms have their added benefits over Firewall, the letter one remains more popular due to its simplicity, specialization and less costs.
  • 11. 3. Enhance System Privacy
  • 12. •Privacy is one of the crucial factors that must be taken care as innocuous information might contain clue that termed to be very helpful to hackers or attackers. •Since to overcome these factors and grab a much effective security value, a Firewall comes in action.
  • 13. •They help in blocking services that can be helped in leaking this information such as finger and Domain Name Service. •These Firewalls can also be used to block DNS information about site systems, thus the names and IP addresses of site systems would not be available to Internet hosts.
  • 14. 4. Shield from Network Misuse, Policy Enforcement
  • 15. •A Firewall can be very beneficial if it was used as a filter towards all of the internet access to and from the system passes through it. •The firewall can log accesses and provide valuable statistics about network usage.
  • 16. •It is very beneficial to collect network usage statistics and evidence of probing for a number of reasons. •One of the primary importance is knowing whether the firewall is withstanding probes and attacks, and determining whether the controls on the firewall are adequate thus helping in maintaining risk factors.
  • 18. •A Firewall can enhance network security and reduce risks to hosts by filtering inherently insecure services. •As a result, the subnet gets shield from all of the risks, as only selected protocols will be able to pass through the Firewall.
  • 19. •A Firewall could block any vulnerable services such as NFS from entering or leaving a subnet. •A Firewall could reject all source-routed packets and ICMP redirects and then inform administrators of the incidents.
  • 20. A Linux Firewall acts as a shield for your system through five different stages, from the time it's installed on your computer to the appearance of the ransom warning on your screen. CONCLUSION:

Editor's Notes

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20