SlideShare a Scribd company logo
1 of 8
Firewall Technologies
The Nature of Today’s Attackers
 Who are these “hackers” who are trying to break into your computer?
Most people imagine someone at a keyboard late at night, guessing
passwords to steal confidential data from a computer system.
This type of attack does happen, but it makes up a very small portion
of the total network attacks that occur.
Today, worms and viruses initiate the vast majority of attacks. Worms
and viruses generally find their targets randomly.
As a result, even organizations with little or no confidential information
need firewalls to protect their networks from these automated
attackers.
What Is a Firewall?
 The term firewall has been around for quite some time and
originally was used to define a barrier constructed to prevent the
spread of fire from one part of a building or structure to another.
Network firewalls provide a barrier between networks that
prevents or denies unwanted or unauthorized traffic.
 Definition:  A Network Firewall is a system or group of systems
used to control access between two networks -- a trusted
network and an untrusted network -- using pre-configured rules
or filters.
What Is a Firewall?
 Device that provides secure connectivity between networks (internal/external)
 Used to implement and enforce a security policy for communication between
networks
 Firewalls can either be hardware and/or software based.
How does a Firewall work?
•Inbound to or outbound from your computer.
•Inspects each “packet” of data that arrives at either side of the firewall.
• Determines whether it should be allowed to pass through or if it should be blocked.
How a firewall works?
1(An attacker tries to compromise a service on the protected network.
2) The Firewall identifies the attempt.
What a personal firewall can do?
•Stop hackers from accessing your computer.
•Protects your personal information.
•Blocks “pop up” ads and certain cookies.
•Determines which programs can access the Internet.
•Block invalid packets.
What Firewalls Cannot Do
 The most common misconception about firewalls is that they guarantee
security for your network.
 A firewall cannot and does not guarantee that your network is 100%
secure.
Firewalls cannot offer any protection against inside attacks. A high
percentage of security incidents today come from inside the trusted
network.
 In most implementations, firewalls cannot provide protection against
viruses or malicious code. Since most firewalls do not inspect the payload
or content of the packet, they are not aware of any threat that may be
contained inside.

More Related Content

What's hot

Network security
Network securityNetwork security
Network securityEstiak Khan
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet securityKaviya452563
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...usman butt
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeIkhtiar Khan Sohan
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionAshwin Harikumar
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network security
Network security Network security
Network security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network security
 Network security Network security
Network security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 

Similar to Firewall

Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Security threats explained
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYabdul talha
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similar to Firewall (20)

Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Firewall
FirewallFirewall
Firewall
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
 
Firewall
FirewallFirewall
Firewall
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Firewall
FirewallFirewall
Firewall
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Firewall
FirewallFirewall
Firewall
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

More from Garmian

الواقع المعزز.pptx
الواقع المعزز.pptxالواقع المعزز.pptx
الواقع المعزز.pptxGarmian
 
معالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptxمعالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptxGarmian
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxGarmian
 
search-engine1.pptx
search-engine1.pptxsearch-engine1.pptx
search-engine1.pptxGarmian
 
data mining.pptx
data mining.pptxdata mining.pptx
data mining.pptxGarmian
 
f17dca29bfa11b0a.pdf
f17dca29bfa11b0a.pdff17dca29bfa11b0a.pdf
f17dca29bfa11b0a.pdfGarmian
 
Bologna_Process_V13 النهائي.pdf
Bologna_Process_V13 النهائي.pdfBologna_Process_V13 النهائي.pdf
Bologna_Process_V13 النهائي.pdfGarmian
 
introduction to java.pptx
introduction to java.pptxintroduction to java.pptx
introduction to java.pptxGarmian
 
search-engine.pptx
search-engine.pptxsearch-engine.pptx
search-engine.pptxGarmian
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxGarmian
 
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptxINTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptxGarmian
 
data mining.pptx
data mining.pptxdata mining.pptx
data mining.pptxGarmian
 
الملكية الفكرية
الملكية الفكريةالملكية الفكرية
الملكية الفكريةGarmian
 
How to create limited user accounts in windows 10
How to create limited user accounts in windows 10How to create limited user accounts in windows 10
How to create limited user accounts in windows 10Garmian
 
Design interactive whiteboard
Design interactive whiteboard Design interactive whiteboard
Design interactive whiteboard Garmian
 
Introduction to windows
Introduction to windowsIntroduction to windows
Introduction to windowsGarmian
 
Google classroom
Google classroomGoogle classroom
Google classroomGarmian
 
Presentation1
Presentation1Presentation1
Presentation1Garmian
 
XOR Cipher
XOR CipherXOR Cipher
XOR CipherGarmian
 

More from Garmian (20)

الواقع المعزز.pptx
الواقع المعزز.pptxالواقع المعزز.pptx
الواقع المعزز.pptx
 
معالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptxمعالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptx
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptx
 
search-engine1.pptx
search-engine1.pptxsearch-engine1.pptx
search-engine1.pptx
 
data mining.pptx
data mining.pptxdata mining.pptx
data mining.pptx
 
f17dca29bfa11b0a.pdf
f17dca29bfa11b0a.pdff17dca29bfa11b0a.pdf
f17dca29bfa11b0a.pdf
 
Bologna_Process_V13 النهائي.pdf
Bologna_Process_V13 النهائي.pdfBologna_Process_V13 النهائي.pdf
Bologna_Process_V13 النهائي.pdf
 
introduction to java.pptx
introduction to java.pptxintroduction to java.pptx
introduction to java.pptx
 
search-engine.pptx
search-engine.pptxsearch-engine.pptx
search-engine.pptx
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptx
 
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptxINTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
 
data mining.pptx
data mining.pptxdata mining.pptx
data mining.pptx
 
الملكية الفكرية
الملكية الفكريةالملكية الفكرية
الملكية الفكرية
 
How to create limited user accounts in windows 10
How to create limited user accounts in windows 10How to create limited user accounts in windows 10
How to create limited user accounts in windows 10
 
Design interactive whiteboard
Design interactive whiteboard Design interactive whiteboard
Design interactive whiteboard
 
Introduction to windows
Introduction to windowsIntroduction to windows
Introduction to windows
 
Google classroom
Google classroomGoogle classroom
Google classroom
 
Presentation1
Presentation1Presentation1
Presentation1
 
Excel
ExcelExcel
Excel
 
XOR Cipher
XOR CipherXOR Cipher
XOR Cipher
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 

Firewall

  • 2. The Nature of Today’s Attackers  Who are these “hackers” who are trying to break into your computer? Most people imagine someone at a keyboard late at night, guessing passwords to steal confidential data from a computer system. This type of attack does happen, but it makes up a very small portion of the total network attacks that occur. Today, worms and viruses initiate the vast majority of attacks. Worms and viruses generally find their targets randomly. As a result, even organizations with little or no confidential information need firewalls to protect their networks from these automated attackers.
  • 3. What Is a Firewall?  The term firewall has been around for quite some time and originally was used to define a barrier constructed to prevent the spread of fire from one part of a building or structure to another. Network firewalls provide a barrier between networks that prevents or denies unwanted or unauthorized traffic.  Definition:  A Network Firewall is a system or group of systems used to control access between two networks -- a trusted network and an untrusted network -- using pre-configured rules or filters.
  • 4. What Is a Firewall?  Device that provides secure connectivity between networks (internal/external)  Used to implement and enforce a security policy for communication between networks  Firewalls can either be hardware and/or software based.
  • 5. How does a Firewall work? •Inbound to or outbound from your computer. •Inspects each “packet” of data that arrives at either side of the firewall. • Determines whether it should be allowed to pass through or if it should be blocked.
  • 6. How a firewall works? 1(An attacker tries to compromise a service on the protected network. 2) The Firewall identifies the attempt.
  • 7. What a personal firewall can do? •Stop hackers from accessing your computer. •Protects your personal information. •Blocks “pop up” ads and certain cookies. •Determines which programs can access the Internet. •Block invalid packets.
  • 8. What Firewalls Cannot Do  The most common misconception about firewalls is that they guarantee security for your network.  A firewall cannot and does not guarantee that your network is 100% secure. Firewalls cannot offer any protection against inside attacks. A high percentage of security incidents today come from inside the trusted network.  In most implementations, firewalls cannot provide protection against viruses or malicious code. Since most firewalls do not inspect the payload or content of the packet, they are not aware of any threat that may be contained inside.