This Presentation(PPT) is all about :
1. Firewall
2. Types of Attacks
3. DMZ
4. DHCP
5. SSL
Through this ppt, we will get to know about how a FIREWALL works and different types of attacks.
also, we will get to know about DMZ(demilitarized zone), DHCP(Dynamic host configuration protocol) and SSL(Secure Sockets Layer).
This Presentation(ppt) is helpful for computer science student studying E-commerce and ERP.
4. CHARACTERISTICS OF A GOOD FIREWALL:
authorised
network
• All Traffic must pass through the firewall
• Only authorized traffic should be allowed to pass
• The firewall should be strong
Fig: Network 1 Fig: Network 2
Firewall
Malicio
us
user
Not allowed(only authorised network)
authorise
d
network
5. FIREWALL IN E-COMMERCE
Fig: Network 2
Firewall
Hacker
User 1
User n
[Blocked ]
Firewall have some Rule:
User 2
[ Allow User 1 and User n ]
7. LIMITATION OF FIREWALL:
•Doesn't analyze the signature or contents
of a Packet/Data
Fig: Firewall
Fig: Network 1
PACKET 1
PACKET 2
PACKET 3
[ We will Antivirus with a Firewall for detection of virus and other
malicious activity ]
Fig: Network 2
[ PACKET 3 easily
bypass the
FIREWALL if it is
available in
Network 1 ]
8. TYPES OF ATTACK:
1.Packet Filters –
It works in the network layer of the OSI Model. It applies
a set of rules (based on the contents of IP and transport
header fields) on each packet and based on the outcome,
decides to either forward or discard the packet.
9. TYPES OF ATTACK:
Security threats to Packet Filters:
• IP address Spoofing
• Source Routing Attacks
• Tiny Fragment Attacks
Prevention:
Firewall can defeat this attack if it discards all the
packets which use the TCP protocol and is
fragmented. Dynamic Packet Filters allow incoming TCP
packets only if they are responses to the outgoing TCP
packets.
11. DMZ
The DMZ (Demilitarized Zone) is an independent network that acts as a
buffer zone between an external network and the internal network.
The buffer network contains, for example, web servers or mail servers, the
communication of which is monitored by firewalls.
12. DMZ
It refers to a specially controlled network that locates between the external
network (Internet) and the internal system.
It is a kind of buffer zone that separates the systems from one another by
strict communication rules and firewalls.
13. DHCP
DHCP stands for dynamic host configuration protocol and is a network
protocol used on IP networks where a DHCP server automatically assigns
an IP address and other information to each host on the network so they
can communicate efficiently with other endpoints.
14. SSL
SSL, or Secure Sockets Layer, is an encryption-based Internet security
protocol. It was first developed by Netscape in 1995 for the purpose of
ensuring privacy, authentication, and data integrity in Internet
communications. SSL is the predecessor to the modern TLS encryption
used today.
15. SSL
SSL (Secure Sockets Layer) and its successor, TLS
(Transport Layer Security), are protocols for establishing
authenticated and encrypted links between networked
computers. Although the SSL protocol was deprecated
with the release of TLS 1.0 in 1999, it is still common to
refer to these related technologies as “SSL” or “SSL/TLS.”
The most current version is TLS 1.3, defined in RFC