SlideShare a Scribd company logo
1 of 14
11
Network Security ThroughNetwork Security Through
FIREWALLFIREWALL
Presented By :-Presented By :-
Creativedev.inCreativedev.in
22
Desirable feature of NetworkDesirable feature of Network
• High Bandwidth at low costHigh Bandwidth at low cost
• SECURITYSECURITY
• Low cost hardware and software at theLow cost hardware and software at the
client sideclient side
33
Hierarchy of variousHierarchy of various
SECURITY levelsSECURITY levels
• BIOS level SecurityBIOS level Security
• Operating System level SecurityOperating System level Security
• Network Operating System SecurityNetwork Operating System Security
• Security Based upon IP addressSecurity Based upon IP address
• E-application SecurityE-application Security
44
SECURITY Issues whileSECURITY Issues while
connecting on the Internetconnecting on the Internet
• Protect confidential informationProtect confidential information
– Network Packet SniffersNetwork Packet Sniffers
– IP SpoofingIP Spoofing
– Password AttacksPassword Attacks
– Man-in-the-middle AttacksMan-in-the-middle Attacks
– Application Layer AttacksApplication Layer Attacks
55
About FIREWALLAbout FIREWALL
• ““A FIREWALL is a software, which is usedA FIREWALL is a software, which is used
for controlling and analyzing data passingfor controlling and analyzing data passing
between two networks.”between two networks.”
• Placed at the point of connection betweenPlaced at the point of connection between
two networkstwo networks
• Barrier to keep destructive forces awayBarrier to keep destructive forces away
66
77
FIREWALL ClassificationFIREWALL Classification
• Packet Filter Firewall (Stateless Inspection)Packet Filter Firewall (Stateless Inspection)
• Application Proxy FirewallApplication Proxy Firewall
• Stateful Packet filtering FirewallStateful Packet filtering Firewall
• Packet filtering based upon contentPacket filtering based upon content
• Network Address TranslationNetwork Address Translation
88
Setup of FIREWALLSetup of FIREWALL
• Dual-homed gatewayDual-homed gateway
99
Protection by FIREWALLProtection by FIREWALL
• Remote loginRemote login
• Application BackdoorsApplication Backdoors
• SMTP session hijackingSMTP session hijacking
• Operating System BugsOperating System Bugs
• Denial of ServiceDenial of Service
• DNS SpoofingDNS Spoofing
1010
Protection by FIREWALLProtection by FIREWALL
• E-mail bombsE-mail bombs
• MacrosMacros
• VirusVirus
• SpamSpam
• Redirect bombsRedirect bombs
• Source RoutingSource Routing
1111
Beyond FIREWALLS…Beyond FIREWALLS…
• VPNVPN
– A method of achieving security by use ofA method of achieving security by use of
software techniquessoftware techniques
– Use of unsecured public network likeUse of unsecured public network like
internet to transmit the data.internet to transmit the data.
• IPSecIPSec
– is a collection of protocols (by IETF )is a collection of protocols (by IETF )
– two modes are usedtwo modes are used
• Tunnel modeTunnel mode
• Transport modeTransport mode
1212
Network Security UtilitiesNetwork Security Utilities
offered by popular O.S. vendorsoffered by popular O.S. vendors
• iptables and ipchains utilities in LINUX foriptables and ipchains utilities in LINUX for
FIREWALL configurationFIREWALL configuration
• Advanced stateful packet and application-Advanced stateful packet and application-
layer inspection firewall including VPN inlayer inspection firewall including VPN in
Microsoft Internet Security and ccelerationMicrosoft Internet Security and cceleration
(ISA) Server 2004(ISA) Server 2004
1313
ConclusionConclusion
• With explosive growth of Internet to ‘always on’With explosive growth of Internet to ‘always on’
connectivity, security has become a concern toconnectivity, security has become a concern to
network administrators and individuals.network administrators and individuals.
• Even organizations without having anyEven organizations without having any
confidential information can find themselves toconfidential information can find themselves to
be victimized, which can result in loss/damage ofbe victimized, which can result in loss/damage of
services/equipment.services/equipment.
• To explore some of most common networkTo explore some of most common network
security problems, suggested possible solutionsecurity problems, suggested possible solution
is FIREWALL.is FIREWALL.
1414
Thank YouThank You
You can contact us onYou can contact us on
info@creativedev.ininfo@creativedev.in
Happy codingHappy coding 

More Related Content

What's hot

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex TrainingBryan Len
 
FireWall
FireWallFireWall
FireWallrubal_9
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryptionAl Ewers
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protectiondavid rom
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 

What's hot (20)

Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex Training
 
FireWall
FireWallFireWall
FireWall
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
Firewalls
FirewallsFirewalls
Firewalls
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protection
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 

Viewers also liked

G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallSatya Harish
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Viewers also liked (6)

G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewall
 
Firewall
FirewallFirewall
Firewall
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Network Security Through FIREWALL

The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls david rom
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworksBrozaa
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016ICT PRISTINE
 
2nd sdn interest group session2 (121218)
2nd sdn interest group   session2 (121218)2nd sdn interest group   session2 (121218)
2nd sdn interest group session2 (121218)NAIM Networks, Inc.
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgEric Vanderburg
 

Similar to Network Security Through FIREWALL (20)

The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworks
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
2nd sdn interest group session2 (121218)
2nd sdn interest group   session2 (121218)2nd sdn interest group   session2 (121218)
2nd sdn interest group session2 (121218)
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Vp ns
Vp nsVp ns
Vp ns
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 

More from TheCreativedev Blog

More from TheCreativedev Blog (9)

Node.js Express Framework
Node.js Express FrameworkNode.js Express Framework
Node.js Express Framework
 
Node js Modules and Event Emitters
Node js Modules and Event EmittersNode js Modules and Event Emitters
Node js Modules and Event Emitters
 
Node.js Basics
Node.js Basics Node.js Basics
Node.js Basics
 
PHP - DataType,Variable,Constant,Operators,Array,Include and require
PHP - DataType,Variable,Constant,Operators,Array,Include and requirePHP - DataType,Variable,Constant,Operators,Array,Include and require
PHP - DataType,Variable,Constant,Operators,Array,Include and require
 
Introduction to PHP Basics
Introduction to PHP BasicsIntroduction to PHP Basics
Introduction to PHP Basics
 
Canvas in html5
Canvas in html5Canvas in html5
Canvas in html5
 
Post via e mail in word press
Post via e mail in word pressPost via e mail in word press
Post via e mail in word press
 
Post via e mail in WordPress
Post via e mail in WordPressPost via e mail in WordPress
Post via e mail in WordPress
 
TO ADD NEW URL REWRITE RULE IN WORDPRESS
TO ADD NEW URL REWRITE RULE IN WORDPRESSTO ADD NEW URL REWRITE RULE IN WORDPRESS
TO ADD NEW URL REWRITE RULE IN WORDPRESS
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Network Security Through FIREWALL

  • 1. 11 Network Security ThroughNetwork Security Through FIREWALLFIREWALL Presented By :-Presented By :- Creativedev.inCreativedev.in
  • 2. 22 Desirable feature of NetworkDesirable feature of Network • High Bandwidth at low costHigh Bandwidth at low cost • SECURITYSECURITY • Low cost hardware and software at theLow cost hardware and software at the client sideclient side
  • 3. 33 Hierarchy of variousHierarchy of various SECURITY levelsSECURITY levels • BIOS level SecurityBIOS level Security • Operating System level SecurityOperating System level Security • Network Operating System SecurityNetwork Operating System Security • Security Based upon IP addressSecurity Based upon IP address • E-application SecurityE-application Security
  • 4. 44 SECURITY Issues whileSECURITY Issues while connecting on the Internetconnecting on the Internet • Protect confidential informationProtect confidential information – Network Packet SniffersNetwork Packet Sniffers – IP SpoofingIP Spoofing – Password AttacksPassword Attacks – Man-in-the-middle AttacksMan-in-the-middle Attacks – Application Layer AttacksApplication Layer Attacks
  • 5. 55 About FIREWALLAbout FIREWALL • ““A FIREWALL is a software, which is usedA FIREWALL is a software, which is used for controlling and analyzing data passingfor controlling and analyzing data passing between two networks.”between two networks.” • Placed at the point of connection betweenPlaced at the point of connection between two networkstwo networks • Barrier to keep destructive forces awayBarrier to keep destructive forces away
  • 6. 66
  • 7. 77 FIREWALL ClassificationFIREWALL Classification • Packet Filter Firewall (Stateless Inspection)Packet Filter Firewall (Stateless Inspection) • Application Proxy FirewallApplication Proxy Firewall • Stateful Packet filtering FirewallStateful Packet filtering Firewall • Packet filtering based upon contentPacket filtering based upon content • Network Address TranslationNetwork Address Translation
  • 8. 88 Setup of FIREWALLSetup of FIREWALL • Dual-homed gatewayDual-homed gateway
  • 9. 99 Protection by FIREWALLProtection by FIREWALL • Remote loginRemote login • Application BackdoorsApplication Backdoors • SMTP session hijackingSMTP session hijacking • Operating System BugsOperating System Bugs • Denial of ServiceDenial of Service • DNS SpoofingDNS Spoofing
  • 10. 1010 Protection by FIREWALLProtection by FIREWALL • E-mail bombsE-mail bombs • MacrosMacros • VirusVirus • SpamSpam • Redirect bombsRedirect bombs • Source RoutingSource Routing
  • 11. 1111 Beyond FIREWALLS…Beyond FIREWALLS… • VPNVPN – A method of achieving security by use ofA method of achieving security by use of software techniquessoftware techniques – Use of unsecured public network likeUse of unsecured public network like internet to transmit the data.internet to transmit the data. • IPSecIPSec – is a collection of protocols (by IETF )is a collection of protocols (by IETF ) – two modes are usedtwo modes are used • Tunnel modeTunnel mode • Transport modeTransport mode
  • 12. 1212 Network Security UtilitiesNetwork Security Utilities offered by popular O.S. vendorsoffered by popular O.S. vendors • iptables and ipchains utilities in LINUX foriptables and ipchains utilities in LINUX for FIREWALL configurationFIREWALL configuration • Advanced stateful packet and application-Advanced stateful packet and application- layer inspection firewall including VPN inlayer inspection firewall including VPN in Microsoft Internet Security and ccelerationMicrosoft Internet Security and cceleration (ISA) Server 2004(ISA) Server 2004
  • 13. 1313 ConclusionConclusion • With explosive growth of Internet to ‘always on’With explosive growth of Internet to ‘always on’ connectivity, security has become a concern toconnectivity, security has become a concern to network administrators and individuals.network administrators and individuals. • Even organizations without having anyEven organizations without having any confidential information can find themselves toconfidential information can find themselves to be victimized, which can result in loss/damage ofbe victimized, which can result in loss/damage of services/equipment.services/equipment. • To explore some of most common networkTo explore some of most common network security problems, suggested possible solutionsecurity problems, suggested possible solution is FIREWALL.is FIREWALL.
  • 14. 1414 Thank YouThank You You can contact us onYou can contact us on info@creativedev.ininfo@creativedev.in Happy codingHappy coding 