Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Download It


Published on

  • Be the first to comment

  • Be the first to like this

Download It

  1. 1. FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson
  2. 2. What is a Firewall? <ul><li>A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system. </li></ul>
  3. 3. History of Firewall <ul><li>First Generation-(1985) First security firewalls appeared. Network layer IP routers with filtering rules that had to be manually changed by the administrator. (Must have intranet access or valid IP address) </li></ul><ul><li>Second Generation-(1989-1990) Circuit level firewall gateways that prevented direct connections between networks through address authorization. </li></ul>
  4. 4. History of Firewalls <ul><li>Third Generation-(1991) First commercial firewall (DEC SEAL), Used filters and application gateways or proxies. </li></ul><ul><li>Fourth Generation-(1994) Check Point Technologies, Firewall-1, developed “first user friendly” firewall. Used dynamic packet filters that dynamically changed filtering rules. </li></ul>
  5. 5. History of Firewall <ul><li>Fifth Generation-(today) Kernel Proxy architecture, which evaluates network packets at multiple layers of a protocol stack in the proxy server. </li></ul>
  6. 6. Types of Firewalls <ul><li>Network Layer-A hardware firewall that controls what packets or information that are passed in or out of your network </li></ul>
  7. 7. Types of Firewalls <ul><li>Application Layer-Software that does not allow direct connections between networks, which performs logging and auditing of traffic. </li></ul>
  8. 8. How Firewalls Work
  9. 10. Cautions <ul><li>Remote Login </li></ul><ul><li>SMTP session hijacking </li></ul><ul><li>Operating system bugs </li></ul><ul><li>Denial of Service </li></ul><ul><li>E-mail bombs </li></ul><ul><li>Macros </li></ul><ul><li>Viruses </li></ul><ul><li>Spam </li></ul><ul><li>Redirect bombs </li></ul><ul><li>Source routing </li></ul><ul><li>Application backdoors </li></ul>Firewalls may only limit these items to an extent.
  10. 11. The level of security you establish will determine how many of these threats can be stopped by your firewall. The highest level of security would simply block everything, this would defeat the purpose of having an internet connection. Basic rule of thumb for all administrators is to first block everything and then implement rules which allow only certain information or packets to pass.
  11. 12. Why would I want a Firewall? <ul><li>To keep hackers out of your network while still letting you get your job done. </li></ul><ul><li>Plays an important role as a security blanket for management </li></ul><ul><li>Mainly just to help </li></ul><ul><li>Gives you a place to store secure information that people in your corporation need access to. </li></ul>
  12. 13. Do They Work? <ul><li>To simply answer this question, they work to an extent, but of course, if a true hacker wants your information they will stop at nothing to get it. And as always, there are accidents that do occur when testing new software, such as probes. So just be cautious! </li></ul>
  13. 14. Websites for Firewall Products <ul><li>http:// </li></ul><ul><li>http:// </li></ul><ul><li>http:// </li></ul><ul><li>http:// </li></ul>
  14. 15. Sites Used <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>