SlideShare a Scribd company logo
1 of 17
Submitted By
Pawan Suresh Nishad
Department of computer studies & research
Sardar patel mahavidyalaya, chandrapur
Session
2022-2023
To be discuss
 What is firewall
 Why do we need a firewall
 Types of firewall
 Methods of delivering firewall
 A firewall is a type of a cyber security tool that is used
to filter traffic on a network
 Firewall can be used to separate network nodes from
external traffic source, internal traffic source, or even
in specific applications.
 Firewall can be software, hardware, or cloud based,
either each type of firewall having its own unique pros
and cons.
Why do we needa firewall
 Protects yours computer from unauthorized access.
 Blocks unwanted content
 Prevents ransom ware from gaining traction
 Creates a secure network for multi-person interaction,
such as online video games
 Helps keep your private information such as online
banking credentials or social security number safe.
Types of firewall
 Packet filtering firewall
 Circuit level gateway
 State full inspection firewall
 Application level gateway(a.k.a. proxy firewall)
 Next gen firewall
Packet-filteringfirewall
 As the most “basic” and oldest type of firewall
architecture, packet filtering firewalls basically create
a checkpoint at a traffic router or switch.
 The firewall performs a simple check of the data
packets coming through the router- inspecting
information such as the destination and origination IP
address, packet type, port number,and other surface-
level information without opening up the packet to
inspect its contents.
Circuit-level gateway
 As another simplistic firewall type that is meant to
quickly and easily approve or deny traffic without
consuming significant computing resources, circuit-
level gateway work by verifying the transmission
control protocol(TCP) handshake. This TCP handshake
check is designed to make sure that the session the
packet is from is legitimate.
StatefulL inspectionfirewalls
 These firewalls combine both packet inspection
technology and TCP handshake verification to create a
level of protection greater than either of the previous
two architectures could provide alone.
 However, these firewalls do put more of a strain on
computing resources as well. This may slow down the
transfer of legitimate packets compared to the other
solutions.
Proxyfirewalls
 Proxy firewalls operate at the application layer to filter
incoming traffic between your network and the traffic
source hence, the name “application-level gateway.”
these firewalls are delivered via a cloud-based solution
or another proxy device. Rather than letting traffic
connect directly, the proxy firewall first establishes a
connection to the source of the traffic and inspect the
incoming data packet.
Next generationfirewalls
 Firewall architectures include deep-packet inspection,
TCP handshake checks, and surface-level packet
inspection. Next-generation firewalls may include other
technologies as well, such as intrusion prevention
systems(IPSs) that work to automatically stop attacks
against your network.
Methodsof deliveringfirewall
 Software firewalls
 Hardware firewalls
 Cloud firewalls
Software firewalls
 Software firewalls include any type of firewall that is
installed on a local device rather than a separate piece
of hardware
 However, maintaining individual software firewall on
different devices can be difficult and time-consuming.
Furthermore, not every device on the network may
mean having to use several different software firewalls
to cover every asset.
Hardware firewalls
 Hardware firewalls use a physical appliance that acts
in a manner similar to a traffic router to intercept data
packets and traffic requests before they’re connected
to the network’s servers.
 The actual capabilities of a hardware firewall may vary
depending on the manufacturer- some may have a more
limited capacity to handle simultaneous connections
than others.
Cloudfirewalls
 Whenever a cloud solution used to delivered a firewall
it can be called as cloud firewall or firewall as a
service(FaaS) cloud firewall are considered
synonymous with proxy firewalls by many, since a
cloud server is often used in a proxy firewall setup.
Whichfirewallis right for my company
 The simple packet filtering or circuit-level
gateway, which provides basic protection
that has minimal performance impact.
 The state full inspection architecture that
combines the capabilities of both of the
previous two options, but has a larger
performance impact.
 A proxy or next-gen firewall that offers far
more robust protection in exchange for
additional expenses and an even higher
performance impact.
Firewall security in computer security

More Related Content

Similar to Firewall security in computer security

Similar to Firewall security in computer security (20)

What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Firewall security in computer security

  • 1. Submitted By Pawan Suresh Nishad Department of computer studies & research Sardar patel mahavidyalaya, chandrapur Session 2022-2023
  • 2.
  • 3. To be discuss  What is firewall  Why do we need a firewall  Types of firewall  Methods of delivering firewall
  • 4.  A firewall is a type of a cyber security tool that is used to filter traffic on a network  Firewall can be used to separate network nodes from external traffic source, internal traffic source, or even in specific applications.  Firewall can be software, hardware, or cloud based, either each type of firewall having its own unique pros and cons.
  • 5. Why do we needa firewall  Protects yours computer from unauthorized access.  Blocks unwanted content  Prevents ransom ware from gaining traction  Creates a secure network for multi-person interaction, such as online video games  Helps keep your private information such as online banking credentials or social security number safe.
  • 6. Types of firewall  Packet filtering firewall  Circuit level gateway  State full inspection firewall  Application level gateway(a.k.a. proxy firewall)  Next gen firewall
  • 7. Packet-filteringfirewall  As the most “basic” and oldest type of firewall architecture, packet filtering firewalls basically create a checkpoint at a traffic router or switch.  The firewall performs a simple check of the data packets coming through the router- inspecting information such as the destination and origination IP address, packet type, port number,and other surface- level information without opening up the packet to inspect its contents.
  • 8. Circuit-level gateway  As another simplistic firewall type that is meant to quickly and easily approve or deny traffic without consuming significant computing resources, circuit- level gateway work by verifying the transmission control protocol(TCP) handshake. This TCP handshake check is designed to make sure that the session the packet is from is legitimate.
  • 9. StatefulL inspectionfirewalls  These firewalls combine both packet inspection technology and TCP handshake verification to create a level of protection greater than either of the previous two architectures could provide alone.  However, these firewalls do put more of a strain on computing resources as well. This may slow down the transfer of legitimate packets compared to the other solutions.
  • 10. Proxyfirewalls  Proxy firewalls operate at the application layer to filter incoming traffic between your network and the traffic source hence, the name “application-level gateway.” these firewalls are delivered via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy firewall first establishes a connection to the source of the traffic and inspect the incoming data packet.
  • 11. Next generationfirewalls  Firewall architectures include deep-packet inspection, TCP handshake checks, and surface-level packet inspection. Next-generation firewalls may include other technologies as well, such as intrusion prevention systems(IPSs) that work to automatically stop attacks against your network.
  • 12. Methodsof deliveringfirewall  Software firewalls  Hardware firewalls  Cloud firewalls
  • 13. Software firewalls  Software firewalls include any type of firewall that is installed on a local device rather than a separate piece of hardware  However, maintaining individual software firewall on different devices can be difficult and time-consuming. Furthermore, not every device on the network may mean having to use several different software firewalls to cover every asset.
  • 14. Hardware firewalls  Hardware firewalls use a physical appliance that acts in a manner similar to a traffic router to intercept data packets and traffic requests before they’re connected to the network’s servers.  The actual capabilities of a hardware firewall may vary depending on the manufacturer- some may have a more limited capacity to handle simultaneous connections than others.
  • 15. Cloudfirewalls  Whenever a cloud solution used to delivered a firewall it can be called as cloud firewall or firewall as a service(FaaS) cloud firewall are considered synonymous with proxy firewalls by many, since a cloud server is often used in a proxy firewall setup.
  • 16. Whichfirewallis right for my company  The simple packet filtering or circuit-level gateway, which provides basic protection that has minimal performance impact.  The state full inspection architecture that combines the capabilities of both of the previous two options, but has a larger performance impact.  A proxy or next-gen firewall that offers far more robust protection in exchange for additional expenses and an even higher performance impact.