SlideShare a Scribd company logo
Firewall, Antivirus
Software
Dr SAJEENA S.
• Preventive
Measures-
Firewall,
Antivirus
Software
• In the realm of cybersecurity,
Antivirus and Firewall are two
words used interchangeably.
Both are used to protect the
hardware and software of a
computer system.
Firewall
• A firewall is a hardware and software-based
security system designed to protect and monitor
both private internet network and a computer
system. Firewall provides a first line of defense for
the resource in an e-commerce system. It defends
against unauthorized access to systems over the
internet.
• Firewall is defined as “a software or hardware-
software combination that filters communication
packets and prevents some malicious packets from
entering the network, based on a security policy.”
Most organizations place a firewall at the internet
entry point of their networks. The firewall provides
a defense between a network and the internet.
Firewalls
operate on
the
following
principles.
All traffic from inside to outside
and from outside to inside the
network must pass through it.
Only authorized traffic, as defined
by the local security policy, is
allowed to pass through it.
The firewall itself is immune to
penetration.
• Types of Firewalls
• Proxy-based firewalls: These are proxies that
sit in between clients and servers. Clients
connect to the firewall, and the firewall
inspects the outgoing packets, after which it
will create a connection to the intended
recipient (the web server). Similarly, when
the web server attempts to send a response
to the client, the firewall will intercept that
request, inspect the packets, and then
deliver that response in a separate
connection between the firewall and the
client. A proxy-based firewall effectively
prevents a direct connection between the
client and server.
• Stateful firewalls: A stateful application is
one which saves data from previous events
and interactions. A stateful firewall saves
information regarding open connections and
uses this information to analyze incoming
and outgoing traffic, rather than inspecting
each packet. Stateful firewalls rely on a lot of
contexts when making decisions. Stateful
firewalls can also protect ports by keeping
them all closed unless incoming packets
request access to a specific port.
Next-Generation Firewalls (NGFW): These are
firewalls that have the capabilities of traditional
firewalls but also employ a host of added features to
address threats on other layers of the Open Systems
Interconnection (OSI) Model.
Some NGFW-specific features include: Deep packet
inspection (DPI), Application awareness, Identity
awareness and Sandboxing.
Web Application Firewalls (WAF): WAFs help to protect web applications
from malicious users. A WAF helps protect web applications by filtering
and monitoring HTTP traffic between a web application and the Internet.
Packet Filter: It is a network security technique that is used to control
data flow to and from a network.
Gateway Server: Gateway servers is a networking hardware or network
node which connects the two disparate network to communicate with
each other.
•Usefulness
of Firewall
• A firewall can monitor all the incoming
traffic. A two – way firewall can monitor the
exiting data as well and can encrypt it too.
• A firewall limits the Trojan horse from
latching onto your computer files and does
damage to the entire network.
• It stops hackers from entering your
network.
• It reduces the risk of keylogging. Keylogging
is a computer program that records every
keystroke made by a computer user to gain
fraudulent access to passwords and other
confidential information.
• Functions of Firewall
• The basic function of a firewall is to analyse any incoming files from the internet
or other computers before accepting the files to download.
• Block viruses or other malicious files before they reach your computer.
• Firewalls prevent malicious programs from accessing and damaging your
computer system.
• Block unsolicited communication between your computer and other computers
outside the organization.
• Protect your computer from hackers. In e-commerce environment, many hackers
attempt to gain access to your computer without your consent. A firewall can
block them before they install on your computer.
• Control outbound connections from your computer to prevent connection to
unauthorized outside nodes.
• Track and record inbound and outbound connections.
Limitations of Firewall
• Firewalls may potentially interfere with the operation of
some programs that access internet. It may block some
communications required for running a program.
• Firewall software can help block viruses and malware, but it
cannot remove viruses and other malware that has been
loaded onto your computer. In other words, firewall is not an
alternative to using an antivirus program, but an additional
level of protection.
• Firewalls can control the traffic between the computer and
the internet, but they are incapable to recognise any attack
against the computer from within.
• Antivirus Software • The most common method available
to protect the computer system
from virus attack is installing
antivirus program. Antivirus
software is a program that helps to
prevent computer threats such as
viruses, hackers and different types
of malware threats. It scans every
file which comes through the
internet, USB devices or external
hard disk to your computer and
helps to protect your computer from
virus attack.
• Virus protection software (antivirus) ensures the protection of
computer system from the constant threat of different types
of viruses. There are several companies that build and offer
antivirus software. Popular antiviruses are Norton Antivirus,
Kaspersky, Avira, Quick Heal, AVG, McFee, Bitdefender, Panda,
BullGuard etc.
The following are the basic functions offered by all antivirus programs.
Ensures Security: Virus protection software scans a computer, create
firewalls, prevents harmful virus attacks and ensures a computer’s overall
security.
Prevents Online Threats: While surfing, downloading or working online,
the antivirus software prevents threats posed by malicious virus attacks
through e-mail attachments, spurious websites, and other proxy/ third
party freeware downloads.
Protects Critical Data: The antivirus software protects critical files,
documents, presentation and photos stored on a computer from being
infected or damaged through virus attacks or virus downloads during
online activities.
Scanning Alerts: Antivirus software alerts users about scanning a specific
file, drive or pen drive, at any time.
Facilitates Timely Updates: Many virus protection programs ensure the
computer’s protection by automatically updating its security features.
• Benefits of Antivirus Software
• Antivirus solutions protect more than just laptops, office computers, smartphones and
tablets. They protect precious memories, music and photo libraries, and important
documents from destruction by malware.
• Modern antivirus solutions are capable of:
• Detecting, blocking, and removing viruses, malware, and ransomware
• Preventing identity theft and block phishing and fraud
• Warning about dangerous websites and links before you click
• Scanning the Dark Web to find if an email address has been compromised
• Keeping online accounts protected with secure password encryption
• Providing simple training to teach you and your family how to be even safer online
• Tuning up your computer to keep it running smoothly, just like new
• There are fundamental differences between a
firewall and antivirus software. For one, a
firewall is a hardware and software-based
security system designed to protect and monitor
both a private internet network and a computer
system. While antivirus is a software program
that detects and eliminates any threats that will
destroy a computer system.
Differences between Firewall and Antivirus
Firewall Antivirus
A firewall is a security network designed to protect
computer systems and networks from malicious attacks.
Antivirus is a software utility program designed to protect a
system from internal attacks from viruses, trojan horse,
spyware etc
The general term used for a firewall is “packet filter”
because it filters any incoming data packets for suspicious
contents.
Antivirus identifies and corrects any weaknesses found in
the computer system.
The main purpose of a firewall is to monitor network traffic
and restrict any unauthorized entry
The main function of an antivirus is to scan, detect, prevent
and remove any existential threat to the computer system
A firewall works at a network protocol level to safeguard
against any unwanted intrusion
An antivirus will only scan for any harmful programs that are
present in the system such as viruses, worms, Trojans etc
One of the limitations of a firewall is that it cannot block
any internal attacks and also those attacks that bypass its
network coverage
One of the limitations of an antivirus is that it cannot check
read-only files.
DEC SEAL was the first commercially viable firewall program
that came out in 1992. Its creation was spearheaded by
American computer scientists Brian Reed and Jeff Mogul.
The first documented removal of a computer virus was by an
actual antivirus software was in 1987 when a German
computer security expert, Bernard Robert Fix, created a
programme to remove a virus that had infected files in a
DOS-based system
Firewall

More Related Content

What's hot

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Firewall
FirewallFirewall
Firewall
FirewallFirewall
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
jangezkhan
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repotKunal Thakur
 

What's hot (20)

Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Computer security
Computer securityComputer security
Computer security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Network security
Network securityNetwork security
Network security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Firewall
FirewallFirewall
Firewall
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 

Similar to Firewall

Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
AthiraKrishnan57
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
Abhijeet Karve
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
UmairFirdous
 
ANTIVIRUS.pptx
ANTIVIRUS.pptxANTIVIRUS.pptx
ANTIVIRUS.pptx
Manish Patel
 
Firewall
FirewallFirewall
Firewall
Garmian
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
amuthadeepa
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
hidivin652
 
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxDiscuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
rtodd615
 
Network security
Network securityNetwork security
Network security
Preethi B
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
S.M. Towhidul Islam
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
VIKASH MAINANWAL
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
Jennifer Letterman
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
IT AMC Support Dubai - Techno Edge Systems LLC
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
ANJUMOHANANU
 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
BluechipComputerSyst
 

Similar to Firewall (20)

Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
ANTIVIRUS.pptx
ANTIVIRUS.pptxANTIVIRUS.pptx
ANTIVIRUS.pptx
 
Firewall
FirewallFirewall
Firewall
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docxDiscuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
Discuss reaction strategies to handle Malware-SolutionMalware- Malware.docx
 
Network security
Network securityNetwork security
Network security
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptxBuilding Fortified Walls Role of Firewall Safeguarding Your Company.pptx
Building Fortified Walls Role of Firewall Safeguarding Your Company.pptx
 

More from sajeena81

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristics
sajeena81
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptx
sajeena81
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptx
sajeena81
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptx
sajeena81
 
Netiquette
NetiquetteNetiquette
Netiquette
sajeena81
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarism
sajeena81
 
Life span psychology
Life span psychologyLife span psychology
Life span psychology
sajeena81
 
Hacking
HackingHacking
Hacking
sajeena81
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
sajeena81
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
sajeena81
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical science
sajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
sajeena81
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable development
sajeena81
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learning
sajeena81
 
E content
E contentE content
E content
sajeena81
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical science
sajeena81
 
Microteaching
MicroteachingMicroteaching
Microteaching
sajeena81
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioning
sajeena81
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variation
sajeena81
 

More from sajeena81 (20)

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristics
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptx
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptx
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarism
 
Life span psychology
Life span psychologyLife span psychology
Life span psychology
 
Hacking
HackingHacking
Hacking
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Computer virus
Computer virusComputer virus
Computer virus
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical science
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable development
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learning
 
E content
E contentE content
E content
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical science
 
Microteaching
MicroteachingMicroteaching
Microteaching
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioning
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variation
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Firewall

  • 2. • Preventive Measures- Firewall, Antivirus Software • In the realm of cybersecurity, Antivirus and Firewall are two words used interchangeably. Both are used to protect the hardware and software of a computer system.
  • 3. Firewall • A firewall is a hardware and software-based security system designed to protect and monitor both private internet network and a computer system. Firewall provides a first line of defense for the resource in an e-commerce system. It defends against unauthorized access to systems over the internet. • Firewall is defined as “a software or hardware- software combination that filters communication packets and prevents some malicious packets from entering the network, based on a security policy.” Most organizations place a firewall at the internet entry point of their networks. The firewall provides a defense between a network and the internet.
  • 4.
  • 5.
  • 6.
  • 7. Firewalls operate on the following principles. All traffic from inside to outside and from outside to inside the network must pass through it. Only authorized traffic, as defined by the local security policy, is allowed to pass through it. The firewall itself is immune to penetration.
  • 8. • Types of Firewalls • Proxy-based firewalls: These are proxies that sit in between clients and servers. Clients connect to the firewall, and the firewall inspects the outgoing packets, after which it will create a connection to the intended recipient (the web server). Similarly, when the web server attempts to send a response to the client, the firewall will intercept that request, inspect the packets, and then deliver that response in a separate connection between the firewall and the client. A proxy-based firewall effectively prevents a direct connection between the client and server.
  • 9. • Stateful firewalls: A stateful application is one which saves data from previous events and interactions. A stateful firewall saves information regarding open connections and uses this information to analyze incoming and outgoing traffic, rather than inspecting each packet. Stateful firewalls rely on a lot of contexts when making decisions. Stateful firewalls can also protect ports by keeping them all closed unless incoming packets request access to a specific port.
  • 10. Next-Generation Firewalls (NGFW): These are firewalls that have the capabilities of traditional firewalls but also employ a host of added features to address threats on other layers of the Open Systems Interconnection (OSI) Model. Some NGFW-specific features include: Deep packet inspection (DPI), Application awareness, Identity awareness and Sandboxing.
  • 11. Web Application Firewalls (WAF): WAFs help to protect web applications from malicious users. A WAF helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. Packet Filter: It is a network security technique that is used to control data flow to and from a network. Gateway Server: Gateway servers is a networking hardware or network node which connects the two disparate network to communicate with each other.
  • 12. •Usefulness of Firewall • A firewall can monitor all the incoming traffic. A two – way firewall can monitor the exiting data as well and can encrypt it too. • A firewall limits the Trojan horse from latching onto your computer files and does damage to the entire network. • It stops hackers from entering your network. • It reduces the risk of keylogging. Keylogging is a computer program that records every keystroke made by a computer user to gain fraudulent access to passwords and other confidential information.
  • 13. • Functions of Firewall • The basic function of a firewall is to analyse any incoming files from the internet or other computers before accepting the files to download. • Block viruses or other malicious files before they reach your computer. • Firewalls prevent malicious programs from accessing and damaging your computer system. • Block unsolicited communication between your computer and other computers outside the organization. • Protect your computer from hackers. In e-commerce environment, many hackers attempt to gain access to your computer without your consent. A firewall can block them before they install on your computer. • Control outbound connections from your computer to prevent connection to unauthorized outside nodes. • Track and record inbound and outbound connections.
  • 14. Limitations of Firewall • Firewalls may potentially interfere with the operation of some programs that access internet. It may block some communications required for running a program. • Firewall software can help block viruses and malware, but it cannot remove viruses and other malware that has been loaded onto your computer. In other words, firewall is not an alternative to using an antivirus program, but an additional level of protection. • Firewalls can control the traffic between the computer and the internet, but they are incapable to recognise any attack against the computer from within.
  • 15. • Antivirus Software • The most common method available to protect the computer system from virus attack is installing antivirus program. Antivirus software is a program that helps to prevent computer threats such as viruses, hackers and different types of malware threats. It scans every file which comes through the internet, USB devices or external hard disk to your computer and helps to protect your computer from virus attack.
  • 16. • Virus protection software (antivirus) ensures the protection of computer system from the constant threat of different types of viruses. There are several companies that build and offer antivirus software. Popular antiviruses are Norton Antivirus, Kaspersky, Avira, Quick Heal, AVG, McFee, Bitdefender, Panda, BullGuard etc.
  • 17. The following are the basic functions offered by all antivirus programs. Ensures Security: Virus protection software scans a computer, create firewalls, prevents harmful virus attacks and ensures a computer’s overall security. Prevents Online Threats: While surfing, downloading or working online, the antivirus software prevents threats posed by malicious virus attacks through e-mail attachments, spurious websites, and other proxy/ third party freeware downloads. Protects Critical Data: The antivirus software protects critical files, documents, presentation and photos stored on a computer from being infected or damaged through virus attacks or virus downloads during online activities. Scanning Alerts: Antivirus software alerts users about scanning a specific file, drive or pen drive, at any time. Facilitates Timely Updates: Many virus protection programs ensure the computer’s protection by automatically updating its security features.
  • 18. • Benefits of Antivirus Software • Antivirus solutions protect more than just laptops, office computers, smartphones and tablets. They protect precious memories, music and photo libraries, and important documents from destruction by malware. • Modern antivirus solutions are capable of: • Detecting, blocking, and removing viruses, malware, and ransomware • Preventing identity theft and block phishing and fraud • Warning about dangerous websites and links before you click • Scanning the Dark Web to find if an email address has been compromised • Keeping online accounts protected with secure password encryption • Providing simple training to teach you and your family how to be even safer online • Tuning up your computer to keep it running smoothly, just like new
  • 19. • There are fundamental differences between a firewall and antivirus software. For one, a firewall is a hardware and software-based security system designed to protect and monitor both a private internet network and a computer system. While antivirus is a software program that detects and eliminates any threats that will destroy a computer system.
  • 20. Differences between Firewall and Antivirus Firewall Antivirus A firewall is a security network designed to protect computer systems and networks from malicious attacks. Antivirus is a software utility program designed to protect a system from internal attacks from viruses, trojan horse, spyware etc The general term used for a firewall is “packet filter” because it filters any incoming data packets for suspicious contents. Antivirus identifies and corrects any weaknesses found in the computer system. The main purpose of a firewall is to monitor network traffic and restrict any unauthorized entry The main function of an antivirus is to scan, detect, prevent and remove any existential threat to the computer system A firewall works at a network protocol level to safeguard against any unwanted intrusion An antivirus will only scan for any harmful programs that are present in the system such as viruses, worms, Trojans etc One of the limitations of a firewall is that it cannot block any internal attacks and also those attacks that bypass its network coverage One of the limitations of an antivirus is that it cannot check read-only files. DEC SEAL was the first commercially viable firewall program that came out in 1992. Its creation was spearheaded by American computer scientists Brian Reed and Jeff Mogul. The first documented removal of a computer virus was by an actual antivirus software was in 1987 when a German computer security expert, Bernard Robert Fix, created a programme to remove a virus that had infected files in a DOS-based system