SlideShare a Scribd company logo
Firewalls: Types & Advantages
Firewall is a system used for securing a network from viruses
and other online threats by acting as an invisible barrier
between untrusted and trusted networks. Either hardware or
software based, Firewall monitors the outgoing and incoming
traffic and prevents cyber-attacks.
Packet Filtering Firewalls
Compare each data packet to established criteria
and then discard or forward it.
Different
Types
Based on functionality, Firewalls can be classified as :
1
Filtering criteria is based on information
contained in the data packet.
Prone to routing attacks and IP address spoofing
due to its network level usage.
Application/Proxy Firewalls
Doesn't allow direct connection between internet
and your system.
2
Examine the data flowing through the system at
an application level.
Offer better security but with less speed and
limited functionality.
Hybrid Firewalls
Combines the features of both packet filtering
and proxy firewalls in series.
3
Provides maximum security as these can work at
both application and network level.
Advantages Of Using A Firewall
Helps you to monitor all the traffic entering
& exiting the network.
Blocks trojan from the outset before it even
have a chance to infect the system.
Assists in keeping the hackers and intruders
away from the network.
Hides your personal information to protect
it from the outside hosts.
Image Source: Designed by Freepik
www.centextech.com
501 N. 4th Street,
Killeen, TX - 76541
Phone:  (254) 213 - 4740
13355 Noel Road
Suite # 1100, Dallas, TX 75240
Phone:  (972) 375 - 9654
1201 Peachtree St NE, 
Suite 200, Atlanta, GA 30361
Phone:  (404) 994 - 5074
Centex Technologies

More Related Content

More from Centextech

Mobile Application Security: Safeguarding Apps in the Digital Age
Mobile Application Security: Safeguarding Apps in the Digital AgeMobile Application Security: Safeguarding Apps in the Digital Age
Mobile Application Security: Safeguarding Apps in the Digital Age
Centextech
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small Businesses
Centextech
 
Secure Access Control with Smart Cards
Secure Access Control with Smart CardsSecure Access Control with Smart Cards
Secure Access Control with Smart Cards
Centextech
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Centextech
 
Cyber security For IoT Devices
Cyber security For IoT DevicesCyber security For IoT Devices
Cyber security For IoT Devices
Centextech
 
Effective Ways to Manage Third Party Cyber Risks
Effective Ways to Manage Third Party  Cyber Risks Effective Ways to Manage Third Party  Cyber Risks
Effective Ways to Manage Third Party Cyber Risks
Centextech
 
How To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyHow To Improve It Risk Management Efficiency
How To Improve It Risk Management Efficiency
Centextech
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy
Centextech
 
Top AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsTop AI-Powered Cyber Threats
Top AI-Powered Cyber Threats
Centextech
 
What is Context Aware Security?
What is Context Aware Security? What is Context Aware Security?
What is Context Aware Security?
Centextech
 
Technological Advancements in Cyber Security
Technological Advancements in Cyber SecurityTechnological Advancements in Cyber Security
Technological Advancements in Cyber Security
Centextech
 
What is Endpoint Protection?
What is Endpoint Protection?What is Endpoint Protection?
What is Endpoint Protection?
Centextech
 
6 Steps of Incident Response Plan
6 Steps of Incident Response Plan6 Steps of Incident Response Plan
6 Steps of Incident Response Plan
Centextech
 
Benefits of VPN For Businesses
Benefits of VPN For BusinessesBenefits of VPN For Businesses
Benefits of VPN For Businesses
Centextech
 
What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?
Centextech
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
Centextech
 
Top Ecommerce Security Threats
Top Ecommerce Security ThreatsTop Ecommerce Security Threats
Top Ecommerce Security Threats
Centextech
 
Key Elements Of IT Security Audit
Key Elements Of IT Security AuditKey Elements Of IT Security Audit
Key Elements Of IT Security Audit
Centextech
 
How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from Attackers
Centextech
 
Business IT Alignment
Business IT AlignmentBusiness IT Alignment
Business IT Alignment
Centextech
 

More from Centextech (20)

Mobile Application Security: Safeguarding Apps in the Digital Age
Mobile Application Security: Safeguarding Apps in the Digital AgeMobile Application Security: Safeguarding Apps in the Digital Age
Mobile Application Security: Safeguarding Apps in the Digital Age
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small Businesses
 
Secure Access Control with Smart Cards
Secure Access Control with Smart CardsSecure Access Control with Smart Cards
Secure Access Control with Smart Cards
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
 
Cyber security For IoT Devices
Cyber security For IoT DevicesCyber security For IoT Devices
Cyber security For IoT Devices
 
Effective Ways to Manage Third Party Cyber Risks
Effective Ways to Manage Third Party  Cyber Risks Effective Ways to Manage Third Party  Cyber Risks
Effective Ways to Manage Third Party Cyber Risks
 
How To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyHow To Improve It Risk Management Efficiency
How To Improve It Risk Management Efficiency
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy
 
Top AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsTop AI-Powered Cyber Threats
Top AI-Powered Cyber Threats
 
What is Context Aware Security?
What is Context Aware Security? What is Context Aware Security?
What is Context Aware Security?
 
Technological Advancements in Cyber Security
Technological Advancements in Cyber SecurityTechnological Advancements in Cyber Security
Technological Advancements in Cyber Security
 
What is Endpoint Protection?
What is Endpoint Protection?What is Endpoint Protection?
What is Endpoint Protection?
 
6 Steps of Incident Response Plan
6 Steps of Incident Response Plan6 Steps of Incident Response Plan
6 Steps of Incident Response Plan
 
Benefits of VPN For Businesses
Benefits of VPN For BusinessesBenefits of VPN For Businesses
Benefits of VPN For Businesses
 
What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?What is Conformance Testing Of An Application?
What is Conformance Testing Of An Application?
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
 
Top Ecommerce Security Threats
Top Ecommerce Security ThreatsTop Ecommerce Security Threats
Top Ecommerce Security Threats
 
Key Elements Of IT Security Audit
Key Elements Of IT Security AuditKey Elements Of IT Security Audit
Key Elements Of IT Security Audit
 
How To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from AttackersHow To Protect Mobile Apps and APIs from Attackers
How To Protect Mobile Apps and APIs from Attackers
 
Business IT Alignment
Business IT AlignmentBusiness IT Alignment
Business IT Alignment
 

Recently uploaded

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 

Recently uploaded (13)

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 

Firewalls Types And Advantages

  • 1. Firewalls: Types & Advantages Firewall is a system used for securing a network from viruses and other online threats by acting as an invisible barrier between untrusted and trusted networks. Either hardware or software based, Firewall monitors the outgoing and incoming traffic and prevents cyber-attacks. Packet Filtering Firewalls Compare each data packet to established criteria and then discard or forward it. Different Types Based on functionality, Firewalls can be classified as : 1 Filtering criteria is based on information contained in the data packet. Prone to routing attacks and IP address spoofing due to its network level usage. Application/Proxy Firewalls Doesn't allow direct connection between internet and your system. 2 Examine the data flowing through the system at an application level. Offer better security but with less speed and limited functionality. Hybrid Firewalls Combines the features of both packet filtering and proxy firewalls in series. 3 Provides maximum security as these can work at both application and network level. Advantages Of Using A Firewall Helps you to monitor all the traffic entering & exiting the network. Blocks trojan from the outset before it even have a chance to infect the system. Assists in keeping the hackers and intruders away from the network. Hides your personal information to protect it from the outside hosts. Image Source: Designed by Freepik www.centextech.com 501 N. 4th Street, Killeen, TX - 76541 Phone:  (254) 213 - 4740 13355 Noel Road Suite # 1100, Dallas, TX 75240 Phone:  (972) 375 - 9654 1201 Peachtree St NE,  Suite 200, Atlanta, GA 30361 Phone:  (404) 994 - 5074 Centex Technologies