SlideShare a Scribd company logo
Sameer Farooq (Reg.no: 11501907)
Lovely Professional University Phagwara, Punjab-144411
Can a firewall alone effectively
block port-scanning activity?
• “hostile Internet searches for open ‘doors,’ or ports, through which intruders gain access to computers.
• consist of sending a message to a port and listening for an answer. The received response indicates the port
status and can be helpful in determining a host’s operating system and other information relevant to launching a
future attack.
• It is sometimes utilized by security technicians to audit computers for vulnerabilities, also used by hackers to
target victims.
Port Scanning
• 3 types:
1. Vertical Scans :
• port scan that targets several destination ports on a single host.
• easiest to detect because only local (single host) detection mechanisms are required.
2. Horizontal Scans
• port scan that targets the same port on several hosts.
3. Block Scans
• Combining vertical and horizontal scanning styles.
Classification Methodology
• Software program or a dedicated network appliance.
• Separate a secure area from a less secure area and to control inbound and outbound communications on anything
from a single machine to an entire network.
Software Firewalls (personal firewalls )
• Prevents unwanted access by identifying and preventing communication over risky ports.
• Computers communicate over many different recognized ports, and the firewall will tend to permit these without
prompting or alerting the user.
• Drawback : software running on a personal computer operating system.
• e.g ZoneAlarm, BlackICE, and Kerio.
Firewall?
Hardware Firewalls
• They also have software components, but run either on a specially engineered network appliance or on an
optimized server dedicated to the task of running the firewall.
• The operating system difficult to attack.
• Used by corporation must be configured,
• Small versions for home users are already configured to block access over risky ports.
• Rules can be as simple as allowing port 80 traffic to flow through the firewall in both directions, or as complex as
only allowing 1433 (SQL server) traffic from a specific IP address
• A firewall monitors incoming and outgoing connections through one's personal computer.
• One technique used by firewall technology is the opening of all the ports at one time. This action stops port
scans from returning any ports.
• Another approach is to filter all port scans going to one's computer. An individual can also choose to port scan
his or her own system, which enables one to see the personal computer through the eyes of a hacker.
• A Port scan is like ringing the doorbell to see whether someone’s at home. The police usually can’t do anything
about it. They have to wait until a crime is committed. Sometimes, if a computer system is affected too much by
a port scan, one can argue that the port scan was, in fact, a denial-of-service (DoS) attack, which is usually an
offense.
• Up-to some extent firewalls are the best protection one can invest in with regard to port scanning. Firewalls
deny outside access to an individual's personal computer.
• With this type of protection, a personal computer is essentially hidden from unwelcome visitors and is also
protected from a variety of other hacking techniques.
Port scanning protection with firewall
• “firewall: buzzword ”
“We have a firewall in place and therefore our network must be secure”.
• Total reliance on the firewall tool, may provide a false sense of security. The firewall it is not a panacea. The
firewall is simply one of many tools in a toolkit for IT security policy.
• Firewalls control both incoming and outgoing network traffic. They can allow certain packets to pass through or
else disable access for them. For example, a firewall can be configured to pass traffic solely to port 80 of the
Web server and to port 25 of the email server
• Human intervention is also required to decide how to screen traffic and “instruct” the firewall to accept or deny
incoming packets. A poorly configured firewall may worsen the system’s effective immunity to attacks. This is
because system administrators may believe that their systems are safe inside the “Maginot Line” and will
become lax towards internal day to day security standards, if a firewall is in place.
Is a firewall the ultimate solution?
• Similarly to “firewall” another buzzword has recently become very popular – “IDS”.
• IDS solutions are designed to monitor events in an IT system, thus complementing the first line of defense (behind
firewalls) against attacks.
• If one wishes to compare to a home anti-burglary system, firewalls perform the role of door and window locks. These
types of locks will stop the majority of burglars but sophisticated intruders may circumvent security devices that
protect an intended target i.e. a home. Therefore, most people use a combination of sophisticated locks with alarm
systems. An IDS performs the role of such an alarm system and adds the next preventive layer of security by detecting
attacks that penetrate IT systems.
• Once the protection barrier has been negotiated, such an anomalous situation must be reported to the system
administrator as quickly as possible. It would be useful to view what an intruder was doing in an IT system. These are
the key tasks for Intrusion Detection System programs.
• IDS tools are those which perform the function of such a “policeman”, by taking care of the security of IT systems
and detecting potential intrusions.
~~~~…… END

More Related Content

What's hot

Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
Mustafash79
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Firewalls
FirewallsFirewalls
Firewalls
Jyoti Akhter
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
Clarejenson
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
Ids & ips
Ids & ipsIds & ips
Intruders
IntrudersIntruders
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
Zara Nawaz
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
Paul Green
 
Firewalls
FirewallsFirewalls
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Preshan Pradeepa
 
Firewalls
FirewallsFirewalls
Firewalls
Akhil Sharma
 
Firewall ppt
Firewall pptFirewall ppt
firewalls
firewallsfirewalls
firewalls
ahmedOday
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 

What's hot (19)

Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Firewalls
FirewallsFirewalls
Firewalls
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
IDS/IPS security
IDS/IPS securityIDS/IPS security
IDS/IPS security
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Ids & ips
Ids & ipsIds & ips
Ids & ips
 
Intruders
IntrudersIntruders
Intruders
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Firewalls
FirewallsFirewalls
Firewalls
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
firewalls
firewallsfirewalls
firewalls
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Similar to Can a firewall alone effectively block port scanning activity

Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
Patten John
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
ssuserc517ee1
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
pg13tarun_g
 
Seminar
SeminarSeminar
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
SriK49
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
LakshayYadav46
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure1
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
Firewall
FirewallFirewall
Firewall
Garmian
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
karthikvcyber
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
useonlyfortech140
 

Similar to Can a firewall alone effectively block port scanning activity (20)

Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Cours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptxCours_4_IDS_IPS.pptx
Cours_4_IDS_IPS.pptx
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Seminar
SeminarSeminar
Seminar
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Firewall
FirewallFirewall
Firewall
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
 

More from sameer farooq

Idps book
Idps bookIdps book
Idps book
sameer farooq
 
Windows firewall
 Windows firewall  Windows firewall
Windows firewall
sameer farooq
 
Virtual Circuit Switching: Frame Relay and ATM
Virtual Circuit Switching:Frame Relayand ATMVirtual Circuit Switching:Frame Relayand ATM
Virtual Circuit Switching: Frame Relay and ATM
sameer farooq
 
Data structure manual
Data structure manualData structure manual
Data structure manual
sameer farooq
 
Java programming lab manual
Java programming lab manualJava programming lab manual
Java programming lab manual
sameer farooq
 
Software Project management
Software Project managementSoftware Project management
Software Project management
sameer farooq
 
kerberos
kerberoskerberos
kerberos
sameer farooq
 
Radio Frequency Waves ,Data communication & Networks
Radio Frequency Waves ,Data communication & NetworksRadio Frequency Waves ,Data communication & Networks
Radio Frequency Waves ,Data communication & Networks
sameer farooq
 

More from sameer farooq (8)

Idps book
Idps bookIdps book
Idps book
 
Windows firewall
 Windows firewall  Windows firewall
Windows firewall
 
Virtual Circuit Switching: Frame Relay and ATM
Virtual Circuit Switching:Frame Relayand ATMVirtual Circuit Switching:Frame Relayand ATM
Virtual Circuit Switching: Frame Relay and ATM
 
Data structure manual
Data structure manualData structure manual
Data structure manual
 
Java programming lab manual
Java programming lab manualJava programming lab manual
Java programming lab manual
 
Software Project management
Software Project managementSoftware Project management
Software Project management
 
kerberos
kerberoskerberos
kerberos
 
Radio Frequency Waves ,Data communication & Networks
Radio Frequency Waves ,Data communication & NetworksRadio Frequency Waves ,Data communication & Networks
Radio Frequency Waves ,Data communication & Networks
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Can a firewall alone effectively block port scanning activity

  • 1. Sameer Farooq (Reg.no: 11501907) Lovely Professional University Phagwara, Punjab-144411 Can a firewall alone effectively block port-scanning activity?
  • 2. • “hostile Internet searches for open ‘doors,’ or ports, through which intruders gain access to computers. • consist of sending a message to a port and listening for an answer. The received response indicates the port status and can be helpful in determining a host’s operating system and other information relevant to launching a future attack. • It is sometimes utilized by security technicians to audit computers for vulnerabilities, also used by hackers to target victims. Port Scanning
  • 3. • 3 types: 1. Vertical Scans : • port scan that targets several destination ports on a single host. • easiest to detect because only local (single host) detection mechanisms are required. 2. Horizontal Scans • port scan that targets the same port on several hosts. 3. Block Scans • Combining vertical and horizontal scanning styles. Classification Methodology
  • 4. • Software program or a dedicated network appliance. • Separate a secure area from a less secure area and to control inbound and outbound communications on anything from a single machine to an entire network. Software Firewalls (personal firewalls ) • Prevents unwanted access by identifying and preventing communication over risky ports. • Computers communicate over many different recognized ports, and the firewall will tend to permit these without prompting or alerting the user. • Drawback : software running on a personal computer operating system. • e.g ZoneAlarm, BlackICE, and Kerio. Firewall?
  • 5. Hardware Firewalls • They also have software components, but run either on a specially engineered network appliance or on an optimized server dedicated to the task of running the firewall. • The operating system difficult to attack. • Used by corporation must be configured, • Small versions for home users are already configured to block access over risky ports. • Rules can be as simple as allowing port 80 traffic to flow through the firewall in both directions, or as complex as only allowing 1433 (SQL server) traffic from a specific IP address
  • 6. • A firewall monitors incoming and outgoing connections through one's personal computer. • One technique used by firewall technology is the opening of all the ports at one time. This action stops port scans from returning any ports. • Another approach is to filter all port scans going to one's computer. An individual can also choose to port scan his or her own system, which enables one to see the personal computer through the eyes of a hacker. • A Port scan is like ringing the doorbell to see whether someone’s at home. The police usually can’t do anything about it. They have to wait until a crime is committed. Sometimes, if a computer system is affected too much by a port scan, one can argue that the port scan was, in fact, a denial-of-service (DoS) attack, which is usually an offense. • Up-to some extent firewalls are the best protection one can invest in with regard to port scanning. Firewalls deny outside access to an individual's personal computer. • With this type of protection, a personal computer is essentially hidden from unwelcome visitors and is also protected from a variety of other hacking techniques. Port scanning protection with firewall
  • 7. • “firewall: buzzword ” “We have a firewall in place and therefore our network must be secure”. • Total reliance on the firewall tool, may provide a false sense of security. The firewall it is not a panacea. The firewall is simply one of many tools in a toolkit for IT security policy. • Firewalls control both incoming and outgoing network traffic. They can allow certain packets to pass through or else disable access for them. For example, a firewall can be configured to pass traffic solely to port 80 of the Web server and to port 25 of the email server • Human intervention is also required to decide how to screen traffic and “instruct” the firewall to accept or deny incoming packets. A poorly configured firewall may worsen the system’s effective immunity to attacks. This is because system administrators may believe that their systems are safe inside the “Maginot Line” and will become lax towards internal day to day security standards, if a firewall is in place. Is a firewall the ultimate solution?
  • 8. • Similarly to “firewall” another buzzword has recently become very popular – “IDS”. • IDS solutions are designed to monitor events in an IT system, thus complementing the first line of defense (behind firewalls) against attacks. • If one wishes to compare to a home anti-burglary system, firewalls perform the role of door and window locks. These types of locks will stop the majority of burglars but sophisticated intruders may circumvent security devices that protect an intended target i.e. a home. Therefore, most people use a combination of sophisticated locks with alarm systems. An IDS performs the role of such an alarm system and adds the next preventive layer of security by detecting attacks that penetrate IT systems. • Once the protection barrier has been negotiated, such an anomalous situation must be reported to the system administrator as quickly as possible. It would be useful to view what an intruder was doing in an IT system. These are the key tasks for Intrusion Detection System programs. • IDS tools are those which perform the function of such a “policeman”, by taking care of the security of IT systems and detecting potential intrusions.