SlideShare a Scribd company logo
1 of 8
Firewall
Created By Himdad
Mohammed
Firewalls have existed since the late 1980s and started out as
packet filters, which were networks set up to examine packets, or
bytes, transferred between computers. Though packet filtering
firewalls are still in use today, firewalls have come a long way as
technology has developed throughout the decades.
Firewall History
1
 Gen 1 Virus
 Generation 1, Late 1980’s, virus attacks on stand-alone PC’s affected all businesses
and drove anti-virus products.
 Gen 2 Networks
 Generation 2, Mid 1990’s, attacks from the internet affected all businesses and drove
the creation of the firewall.
 Gen 3 Applications
 Generation 3, Early 2000’s, exploiting applications’ vulnerabilities that affected
most businesses and drove Intrusion Prevention Systems Products (IPS).
 Gen 4 Payload
 Generation 4, Approx. 2010, the rise of targeted, unknown, evasive, polymorphic
attacks affected most businesses and drove anti-bot and sandboxing products.
 Gen 5 Mega
 Generation 5, Approx. 2017, large-scale, multi-vector, mega attacks using advanced
attack tools are driving advanced threat prevention solutions.
Generations
2
including:
 Network Threat Prevention
 Application and Identity-Based Control
 Hybrid Cloud Support
 Scalable Performance
3
Today’s firewalls, including Next Generation Firewalls and Network
Firewalls
support a wide variety of functions and capabilities with built-in
features,
 Packet filtering :A small amount of data is analyzed and distributed
according to the filter’s standards.
 Proxy service :Network security system that protects while filtering
messages at the application layer.
 Stateful inspection :Dynamic packet filtering that monitors active
connections to determine which network packets to allow through the
Firewall.
 Next-Generation Firewall (NGFW) :Deep packet inspection Firewall with
the application-level inspection.
Types of Firewalls
4
A Firewall is a necessary part of any security architecture and takes the guesswork
out of host-level protections and entrusts them to your network security device.
Firewalls, and especially Next Generation Firewalls, focus on blocking malware and
application-layer attacks, along with an integrated intrusion prevention system (IPS),
these Next Generation Firewalls can react quickly and seamlessly to detect and react
to outside attacks across the whole network. They can set policies to better defend
your network and carry out quick assessments to detect invasive or suspicious
activity, like malware, and shut it down.
What Firewalls Do?
5
Network layer or packet filters inspect packets at a relatively low
level of the TCP/IP protocol stack, not allowing packets to pass
through the firewall unless they match the established rule set
where the source and destination of the rule set are based upon
Internet Protocol ( IP addresses and ports. Firewalls that do network
layer inspection perform better than similar devices that do
application layer inspection. The downside is that unwanted
applications or malware can pass over allowed ports, e.g. outbound
Internet traffic over web protocols HTTP and HTTPS, ports 80 and
443 respectively.
Network Layer vs. Application Layer
Inspection
6
Thank You!
Himdad Mohammed
+964 750 452 0525
Qala University

More Related Content

Similar to Firewall.pptx

Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
jibinsh
 
169
169169
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
Codenomicon
 
Firewall
FirewallFirewall
Firewall
Apo
 

Similar to Firewall.pptx (20)

Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
169
169169
169
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Fuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for TelecommunicationsFuzzing101: Unknown vulnerability management for Telecommunications
Fuzzing101: Unknown vulnerability management for Telecommunications
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Top 5 Benefits of Managed Next Generation Firewall Services
Top 5 Benefits of Managed Next Generation Firewall ServicesTop 5 Benefits of Managed Next Generation Firewall Services
Top 5 Benefits of Managed Next Generation Firewall Services
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Firewall.pptx

  • 2. Firewalls have existed since the late 1980s and started out as packet filters, which were networks set up to examine packets, or bytes, transferred between computers. Though packet filtering firewalls are still in use today, firewalls have come a long way as technology has developed throughout the decades. Firewall History 1
  • 3.  Gen 1 Virus  Generation 1, Late 1980’s, virus attacks on stand-alone PC’s affected all businesses and drove anti-virus products.  Gen 2 Networks  Generation 2, Mid 1990’s, attacks from the internet affected all businesses and drove the creation of the firewall.  Gen 3 Applications  Generation 3, Early 2000’s, exploiting applications’ vulnerabilities that affected most businesses and drove Intrusion Prevention Systems Products (IPS).  Gen 4 Payload  Generation 4, Approx. 2010, the rise of targeted, unknown, evasive, polymorphic attacks affected most businesses and drove anti-bot and sandboxing products.  Gen 5 Mega  Generation 5, Approx. 2017, large-scale, multi-vector, mega attacks using advanced attack tools are driving advanced threat prevention solutions. Generations 2
  • 4. including:  Network Threat Prevention  Application and Identity-Based Control  Hybrid Cloud Support  Scalable Performance 3 Today’s firewalls, including Next Generation Firewalls and Network Firewalls support a wide variety of functions and capabilities with built-in features,
  • 5.  Packet filtering :A small amount of data is analyzed and distributed according to the filter’s standards.  Proxy service :Network security system that protects while filtering messages at the application layer.  Stateful inspection :Dynamic packet filtering that monitors active connections to determine which network packets to allow through the Firewall.  Next-Generation Firewall (NGFW) :Deep packet inspection Firewall with the application-level inspection. Types of Firewalls 4
  • 6. A Firewall is a necessary part of any security architecture and takes the guesswork out of host-level protections and entrusts them to your network security device. Firewalls, and especially Next Generation Firewalls, focus on blocking malware and application-layer attacks, along with an integrated intrusion prevention system (IPS), these Next Generation Firewalls can react quickly and seamlessly to detect and react to outside attacks across the whole network. They can set policies to better defend your network and carry out quick assessments to detect invasive or suspicious activity, like malware, and shut it down. What Firewalls Do? 5
  • 7. Network layer or packet filters inspect packets at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set where the source and destination of the rule set are based upon Internet Protocol ( IP addresses and ports. Firewalls that do network layer inspection perform better than similar devices that do application layer inspection. The downside is that unwanted applications or malware can pass over allowed ports, e.g. outbound Internet traffic over web protocols HTTP and HTTPS, ports 80 and 443 respectively. Network Layer vs. Application Layer Inspection 6
  • 8. Thank You! Himdad Mohammed +964 750 452 0525 Qala University