SlideShare a Scribd company logo
1 of 15
BY K.VIDYA MADHURI
IT-F1
ROLL NO- 14311A1201
FIREWALLS
• FIREWALL-INTRODUCTION
• BRIEF HISTORY OF FIREWALLS
• TYPES OF FIREWALLS
• HOW A FIREWALL WORKS
• APPLICATIONS
CONTENTS
WHAT IS A FIREWALL?
• A firewall is a system designed to prevent
unauthorized access to or from a private network.
• Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through the
firewall, which examines each message and blocks those that do
not meet the specified security criteria
FIREWALL-INTRODUCTION
• Firewall technology emerged in the late 1980s when the Internet
was a fairly new technology in terms of its global use and
connectivity.
• The predecessors to firewalls for network security were the
routers used in the late 1980s.
BRIEF HISTORY OF FIREWALLS
The early firewall
settings showing
the incoming and
outgoing traffic.
• Clifford Stoll's discovery of German spies tampering with his
system.
• Bill Cheswick's "Evening with Berferd" 1992, in which he set up a
simple electronic "jail" to observe an attacker.
TYPES OF FIREWALLS
An illustration of
where a firewall can
be located in a
network.
• Network layer firewalls: Network layer firewalls, also called packet
filters, operate at a relatively low level of the TCP/IP protocol stack, not
allowing packets to pass through the firewall unless they match the
established rule set. The firewall administrator may define the rules; or
default rules may apply.
• Application layer firewalls: Application-layer firewalls work on the
application level of the TCP/IP stack (i.e., all browser traffic, or
all telnet or ftp traffic), and may intercept all packets traveling to or from an
application. They block other packets (usually dropping them without
acknowledgment to the sender).
• Proxies: A proxy server (running either on dedicated hardware or as
software on a general-purpose machine) may act as a firewall by responding
to input packets (connection requests, for example) in the manner of an
application, while blocking other packets. A proxy server is a gateway from
one network to another for a specific network application, in the sense that
it functions as a proxy on behalf of the network user.
• There are also other types of firewalls: Hardware firewalls and
software firewalls.
• Hardware firewalls employ hardware devices like broadband
routers for protecting networks.
• Software firewalls employ a software running on the host computer
to ensure the network protection.
HOW A FIREWALL WORKS?
• There are two access denial methodologies used by firewalls. A
firewall may allow all traffic through unless it meets certain criteria,
or it may deny all traffic unless it meets certain criteria.
• Firewalls may be concerned with the type of traffic, or with source
or destination addresses and ports. They may also use complex rule
bases that analyze the application data to determine if the traffic
should be allowed through.
• The type of criteria used to determine whether traffic should be
allowed through varies from one type of firewall to another like IP
addresses, protocols, ports and domains.
At a personal level, firewall does the following things:
•Block or alert the user about all unauthorized inbound or outbound
connection attempts.
•Allows the user to control which programs can and cannot access the local
network and/or Internet and provide the user with information about an
application that makes a connection attempt.
•Hide the computer from port scans by not responding to unsolicited network
traffic.
•Monitor applications that are listening for incoming connections.
•Monitor and regulate all incoming and outgoing Internet users.
•Prevent unwanted network traffic from locally installed applications.
•Provide information about the destination server with which an application
is attempting to communicate.
APPLICATIONS OF FIREWALLS
Anyone who is responsible for a private
network that is connected to a public
network needs firewall protection.
Furthermore, anyone who connects so
much as a single computer to the
Internet via modem should have
personal firewall software.
• Firewalls cannot enforce your password policy or prevent misuse
of passwords.
• Firewalls cannot protect you from poor decisions.
• Firewalls cannot protect you when your security policy is too lax.
• Firewalls cannot stop internal users from accessing websites
with malicious code, making user education critical.
LIMITATIONS OF FIREWALLS
THANK YOU!!

More Related Content

What's hot

Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Firewall
FirewallFirewall
FirewallApo
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 

What's hot (20)

Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Network security
Network securityNetwork security
Network security
 
FireWall
FireWallFireWall
FireWall
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network defenses
Network defensesNetwork defenses
Network defenses
 

Viewers also liked

Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Cam Tat's CV
Cam Tat's CVCam Tat's CV
Cam Tat's CVCam Tat
 
Retreat House - Sketch Journal
Retreat House - Sketch JournalRetreat House - Sketch Journal
Retreat House - Sketch JournalYeeQun
 
проект слава козацька не вмре, не загине
проект слава козацька не вмре, не загинепроект слава козацька не вмре, не загине
проект слава козацька не вмре, не загинеPoltava municipal lyceum #1
 
навички ділового спілкування
навички ділового спілкуваннянавички ділового спілкування
навички ділового спілкуванняPoltava municipal lyceum #1
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowingReineM
 
Final PDF Paper 3-6-12
Final PDF Paper 3-6-12Final PDF Paper 3-6-12
Final PDF Paper 3-6-12Geza Kmetty
 
правила дії під час виявлення внп
правила дії під час виявлення внпправила дії під час виявлення внп
правила дії під час виявлення внпPoltava municipal lyceum #1
 
Dossier liberiamo-gli-animali-dai-circhi
Dossier liberiamo-gli-animali-dai-circhiDossier liberiamo-gli-animali-dai-circhi
Dossier liberiamo-gli-animali-dai-circhiClaudia Bertanza
 
分子進化の統計モデリングとモデル選択 実習編
分子進化の統計モデリングとモデル選択 実習編分子進化の統計モデリングとモデル選択 実習編
分子進化の統計モデリングとモデル選択 実習編astanabe
 
Progressive Final Draft of Senior Paper-1
Progressive Final Draft of Senior Paper-1Progressive Final Draft of Senior Paper-1
Progressive Final Draft of Senior Paper-1Tezlynn Tillmon
 
Warren buffett 110210111114
Warren buffett  110210111114Warren buffett  110210111114
Warren buffett 110210111114jashubhoya
 

Viewers also liked (20)

Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Why Invest for Retirement?
Why Invest for Retirement?Why Invest for Retirement?
Why Invest for Retirement?
 
Cam Tat's CV
Cam Tat's CVCam Tat's CV
Cam Tat's CV
 
Retreat House - Sketch Journal
Retreat House - Sketch JournalRetreat House - Sketch Journal
Retreat House - Sketch Journal
 
проект слава козацька не вмре, не загине
проект слава козацька не вмре, не загинепроект слава козацька не вмре, не загине
проект слава козацька не вмре, не загине
 
навички ділового спілкування
навички ділового спілкуваннянавички ділового спілкування
навички ділового спілкування
 
Kearifan Lokal
Kearifan LokalKearifan Lokal
Kearifan Lokal
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
Final PDF Paper 3-6-12
Final PDF Paper 3-6-12Final PDF Paper 3-6-12
Final PDF Paper 3-6-12
 
Muhammad Qasim Zaib C.V
Muhammad Qasim Zaib C.VMuhammad Qasim Zaib C.V
Muhammad Qasim Zaib C.V
 
державний прапор україни
державний прапор українидержавний прапор україни
державний прапор україни
 
Power protection
Power protectionPower protection
Power protection
 
3 proekt exkursiya do-lavri
3 proekt exkursiya do-lavri3 proekt exkursiya do-lavri
3 proekt exkursiya do-lavri
 
правила дії під час виявлення внп
правила дії під час виявлення внпправила дії під час виявлення внп
правила дії під час виявлення внп
 
Borgarte storia
Borgarte storiaBorgarte storia
Borgarte storia
 
Dossier liberiamo-gli-animali-dai-circhi
Dossier liberiamo-gli-animali-dai-circhiDossier liberiamo-gli-animali-dai-circhi
Dossier liberiamo-gli-animali-dai-circhi
 
分子進化の統計モデリングとモデル選択 実習編
分子進化の統計モデリングとモデル選択 実習編分子進化の統計モデリングとモデル選択 実習編
分子進化の統計モデリングとモデル選択 実習編
 
Bai trinh dien_gioi_thieu_bai_day
Bai trinh dien_gioi_thieu_bai_dayBai trinh dien_gioi_thieu_bai_day
Bai trinh dien_gioi_thieu_bai_day
 
Progressive Final Draft of Senior Paper-1
Progressive Final Draft of Senior Paper-1Progressive Final Draft of Senior Paper-1
Progressive Final Draft of Senior Paper-1
 
Warren buffett 110210111114
Warren buffett  110210111114Warren buffett  110210111114
Warren buffett 110210111114
 

Similar to Firewalls

Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)marghali
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
Can a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activityCan a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activitysameer farooq
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptxLakshayYadav46
 

Similar to Firewalls (20)

Seminar
SeminarSeminar
Seminar
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Can a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activityCan a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activity
 
Firewall
FirewallFirewall
Firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Firewalls

  • 1. BY K.VIDYA MADHURI IT-F1 ROLL NO- 14311A1201 FIREWALLS
  • 2. • FIREWALL-INTRODUCTION • BRIEF HISTORY OF FIREWALLS • TYPES OF FIREWALLS • HOW A FIREWALL WORKS • APPLICATIONS CONTENTS
  • 3. WHAT IS A FIREWALL?
  • 4. • A firewall is a system designed to prevent unauthorized access to or from a private network. • Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. • All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria FIREWALL-INTRODUCTION
  • 5. • Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. • The predecessors to firewalls for network security were the routers used in the late 1980s. BRIEF HISTORY OF FIREWALLS The early firewall settings showing the incoming and outgoing traffic.
  • 6. • Clifford Stoll's discovery of German spies tampering with his system. • Bill Cheswick's "Evening with Berferd" 1992, in which he set up a simple electronic "jail" to observe an attacker.
  • 7. TYPES OF FIREWALLS An illustration of where a firewall can be located in a network.
  • 8. • Network layer firewalls: Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. • Application layer firewalls: Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender). • Proxies: A proxy server (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets. A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user.
  • 9. • There are also other types of firewalls: Hardware firewalls and software firewalls. • Hardware firewalls employ hardware devices like broadband routers for protecting networks. • Software firewalls employ a software running on the host computer to ensure the network protection.
  • 10. HOW A FIREWALL WORKS?
  • 11. • There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria. • Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyze the application data to determine if the traffic should be allowed through. • The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another like IP addresses, protocols, ports and domains.
  • 12. At a personal level, firewall does the following things: •Block or alert the user about all unauthorized inbound or outbound connection attempts. •Allows the user to control which programs can and cannot access the local network and/or Internet and provide the user with information about an application that makes a connection attempt. •Hide the computer from port scans by not responding to unsolicited network traffic. •Monitor applications that are listening for incoming connections. •Monitor and regulate all incoming and outgoing Internet users. •Prevent unwanted network traffic from locally installed applications. •Provide information about the destination server with which an application is attempting to communicate. APPLICATIONS OF FIREWALLS
  • 13. Anyone who is responsible for a private network that is connected to a public network needs firewall protection. Furthermore, anyone who connects so much as a single computer to the Internet via modem should have personal firewall software.
  • 14. • Firewalls cannot enforce your password policy or prevent misuse of passwords. • Firewalls cannot protect you from poor decisions. • Firewalls cannot protect you when your security policy is too lax. • Firewalls cannot stop internal users from accessing websites with malicious code, making user education critical. LIMITATIONS OF FIREWALLS