SlideShare a Scribd company logo
1 of 17
PREVENTIVE MEASURES-
FIREWALL,ANTIVIRUS SOFTWARE
AnjuMohanan.U
Roll no. -23
Physical science
Edu03
Firewall
 A firewall is a network security system, in the form of computer
hardware or software, that monitors and controls incoming and
outgoing network traffic, based on predetermined security rules
 It monitors attempts to gain access to your operating system and
blocks unwanted incoming traffic and unrecognized sources
 It can also help block malicious software from infecting your
computer
 A firewall typically establishes a barrier between a trusted network
and an untrusted network, such as the internet
How does firewalls work?
 A firewall maintains a set of rules which are applied to both incoming
and outgoing traffic
 It matches the traffic against those rules, and if the rules are matched,
it initiates the access
 For outgoing traffic originating from the server,the firewall lets them
pass mostly
 But for incoming traffic reaching from major protocol, the firewalls
monitor them strictly
 The firewall inspects incoming traffic based on their:
1. Source
2. Content
3. Destination
4. Port
 The firewall uses this data to decide whether the traffic abides by the
set rules
 If yes,then it permits;otherwise, the traffic gets blocked by the firewall
Functions of Firewall
 A firewall acts as a gatekeeper
 It monitors attempts to gain access to your operating system and
blocks unwanted traffic or unrecognized sources
 A firewall acts as a barrier or filter between our computer and
another network such as the internet
 It helps to protect our network and information by managing our
network traffic by blocking unsolicited incoming network traffic
and validating access by accessing network traffic for anything
malicious like hackers and malware
 Any data which enters or exits a computer network has to pass
through the firewall
 All the valuable information stays intact if the data packets are
securely passed through the firewall
 Every time a data packet passes through a firewall, it records it
which allows the user to record the network activity
 Precisely,a firewall ensures that all the data is secure and any
malicious data trying to enter the internal network is not allowed
to pass through
Firewall Techniques
There are four general techniques that firewall use to control
access and enforce the site’s security policy
 Service control
 Direction control
 User control
 Behavior control
Types of Firewall
 Structurally firewall can be classified into
1. Software firewalls
2. Hardware firewalls
 Firewalls are also categorized based on how they operate
1. Packet-filtering firewalls
2. Circuit level gateways
3. Stateful multi-layer inspection(SMLI) firewalls
4. Application -level gateways (proxy firewalls)
Risk of not having firewall
Cyber threats are widespread and evolving. It’s important to use available defense to help
protect your network, and the personal information stored on your computer, against
cybercrimes. Here are the three main risks of not having firewall:
 Open access
Without a firewall, you’re accepting every connection into your network from anyone. You
wouldn’t have any way to detect incoming threats that could leave your device vulnerable
to malicious user
 Lost or compromised data
Not having a firewall could leave your device exposed, which could allow someone to gain
control over your computer or network. Cybercriminals could delete your data.Or they
could use it to commit identity theft or financial fraud
 Network crashes
Without a firewall, attackers could shut down your network. Getting it running again, and
attempting to recover your stored data, could involve your time and money
Limitations of Firewall
 How it verifies trusted data
Our computer’s operating system have a list of trusted programs and
previously allowed programs. When data packet arrives a firewall, the
firewall checks whether the incoming data packet belongs to an
application in the list of reputed0 programs. If it belongs firewall allows
the data packet to pass through the computer. Hacker can easily exploit
this by creating a fake data packet containing trusted IP address to hack
our computer or our computer network
 Insider’s intrusion
The firewall may not protect fully against internal threats, such as a
disgruntled employee or an employee who unwittingly cooperates with
an external hacker
 Direct internet traffic
While installing an application like m Torrent in your
computer, during its installation you will get a check box
saying “Add an exception for m Torrent from internet to your
computer. In such cases hacker can send some malicious
data through m Torrent without being detected by the
firewall
 Firewall’s trust on trusted network
Suppose your computer is connected to a network and your network is
connected to another trusted network via a hardware firewall, since
network is trusted firewall allows all the data packets coming from the
trusted network. If the hacker has connected his computer to this
trusted network firewall will allow all the infected data packets from
hacker to pass through your network and then to your computer
 Firewalls do not provides us any antivirus or anti -malware
property
We need additional protection in our computer if some harmful files
have been introduced to our system from the networking channels like
emails
Antivirus software
Antivirus software typically uses two different techniques
to accomplish mission:
 Examining (scanning) files to look for known viruses
matching definitions in a virus dictionary
 Identifying suspicious behavior from any computer
program which might indicate infection. Such
analysis may include data captures, port monitoring
and other methods.
Antivirus software consists of computer programs that
attempt to identify, thwart and eliminate computer viruses
and other malicious software (malware).
Advantages of antivirus Software
 Spam and advertisements are blocked
 Virus protection and transmission prevention
 Hackers and data thieves are thwarted
 Protection against devices that can be detached
 To improve security from web,restrict website access
 Password protection
Disadvantages of antivirus
 Slow downs systems speed
 Popping up of advertisements
 No customer care service
edu03firewall,Antivirus software.pptx

More Related Content

What's hot

Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshellHishan Shouketh
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 

What's hot (20)

Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Firewalls
FirewallsFirewalls
Firewalls
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Firewall
FirewallFirewall
Firewall
 

Similar to edu03firewall,Antivirus software.pptx

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefitsAnthony Daniel
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptxssuserd24233
 
Firewall
FirewallFirewall
FirewallGarmian
 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBluechipComputerSyst
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Firewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptxFirewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptxMuhammadSaoodChoudha
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 

Similar to edu03firewall,Antivirus software.pptx (20)

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Firewall
FirewallFirewall
Firewall
 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Firewall
FirewallFirewall
Firewall
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Firewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptxFirewall By Saood N Mubeen for network security.pptx
Firewall By Saood N Mubeen for network security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network security
Network securityNetwork security
Network security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

edu03firewall,Antivirus software.pptx

  • 2. Firewall  A firewall is a network security system, in the form of computer hardware or software, that monitors and controls incoming and outgoing network traffic, based on predetermined security rules  It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources  It can also help block malicious software from infecting your computer  A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the internet
  • 3. How does firewalls work?  A firewall maintains a set of rules which are applied to both incoming and outgoing traffic  It matches the traffic against those rules, and if the rules are matched, it initiates the access  For outgoing traffic originating from the server,the firewall lets them pass mostly  But for incoming traffic reaching from major protocol, the firewalls monitor them strictly
  • 4.  The firewall inspects incoming traffic based on their: 1. Source 2. Content 3. Destination 4. Port  The firewall uses this data to decide whether the traffic abides by the set rules  If yes,then it permits;otherwise, the traffic gets blocked by the firewall
  • 6.  A firewall acts as a gatekeeper  It monitors attempts to gain access to your operating system and blocks unwanted traffic or unrecognized sources  A firewall acts as a barrier or filter between our computer and another network such as the internet  It helps to protect our network and information by managing our network traffic by blocking unsolicited incoming network traffic and validating access by accessing network traffic for anything malicious like hackers and malware  Any data which enters or exits a computer network has to pass through the firewall
  • 7.  All the valuable information stays intact if the data packets are securely passed through the firewall  Every time a data packet passes through a firewall, it records it which allows the user to record the network activity  Precisely,a firewall ensures that all the data is secure and any malicious data trying to enter the internal network is not allowed to pass through
  • 8. Firewall Techniques There are four general techniques that firewall use to control access and enforce the site’s security policy  Service control  Direction control  User control  Behavior control
  • 9. Types of Firewall  Structurally firewall can be classified into 1. Software firewalls 2. Hardware firewalls  Firewalls are also categorized based on how they operate 1. Packet-filtering firewalls 2. Circuit level gateways 3. Stateful multi-layer inspection(SMLI) firewalls 4. Application -level gateways (proxy firewalls)
  • 10. Risk of not having firewall Cyber threats are widespread and evolving. It’s important to use available defense to help protect your network, and the personal information stored on your computer, against cybercrimes. Here are the three main risks of not having firewall:  Open access Without a firewall, you’re accepting every connection into your network from anyone. You wouldn’t have any way to detect incoming threats that could leave your device vulnerable to malicious user  Lost or compromised data Not having a firewall could leave your device exposed, which could allow someone to gain control over your computer or network. Cybercriminals could delete your data.Or they could use it to commit identity theft or financial fraud  Network crashes Without a firewall, attackers could shut down your network. Getting it running again, and attempting to recover your stored data, could involve your time and money
  • 11. Limitations of Firewall  How it verifies trusted data Our computer’s operating system have a list of trusted programs and previously allowed programs. When data packet arrives a firewall, the firewall checks whether the incoming data packet belongs to an application in the list of reputed0 programs. If it belongs firewall allows the data packet to pass through the computer. Hacker can easily exploit this by creating a fake data packet containing trusted IP address to hack our computer or our computer network  Insider’s intrusion The firewall may not protect fully against internal threats, such as a disgruntled employee or an employee who unwittingly cooperates with an external hacker
  • 12.  Direct internet traffic While installing an application like m Torrent in your computer, during its installation you will get a check box saying “Add an exception for m Torrent from internet to your computer. In such cases hacker can send some malicious data through m Torrent without being detected by the firewall
  • 13.  Firewall’s trust on trusted network Suppose your computer is connected to a network and your network is connected to another trusted network via a hardware firewall, since network is trusted firewall allows all the data packets coming from the trusted network. If the hacker has connected his computer to this trusted network firewall will allow all the infected data packets from hacker to pass through your network and then to your computer  Firewalls do not provides us any antivirus or anti -malware property We need additional protection in our computer if some harmful files have been introduced to our system from the networking channels like emails
  • 14. Antivirus software Antivirus software typically uses two different techniques to accomplish mission:  Examining (scanning) files to look for known viruses matching definitions in a virus dictionary  Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods. Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware).
  • 15. Advantages of antivirus Software  Spam and advertisements are blocked  Virus protection and transmission prevention  Hackers and data thieves are thwarted  Protection against devices that can be detached  To improve security from web,restrict website access  Password protection
  • 16. Disadvantages of antivirus  Slow downs systems speed  Popping up of advertisements  No customer care service