SlideShare a Scribd company logo
CONTENTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUER NETWORKS ARE  TYPICALLY  A SHARED RESOURCES  USED BY MANY APPLICATIONS  FOR  MANY DIFFERENT  PURPOSES. SOMETIMES THE DATA TRANSMITTED BETWEEN APPLICATION  PROCESS  IS  CONFIDENTIAL, AND THE  APPLICATIONS  WOULD  PREFER THAT OTHERS NOT  BE ABLE  TO  READ IT .BUT  THE  PROBLEM ARISES WHEN  SOMEONE  ELSE  WANT  TO MANIPULATE  WITH  YOUR  DATA .TO  BUILD  A  SYSTEM  THAT  MINIMIZES  THE  RISK  OF  SECURITY,IS  A  DIFFICULT  TASK. HOWEVER  THERE  ARE  SOME  ALOGORITHMS  AND  PROTOCOLS  AVAILABLE. ONE  OF  THEM IS  “FIREWALL”. INTRODUCTION
KEY WORDS   DSL #  Digital Subscriber Line .  A  family  of standards  for  transmitting  data  over  twisted  pair telephone  lines at multi mega bit per  second  speeds.  FTP  #  File Transfer  Protocol .  The  standard  protocol  of  the  internet  - architecture  for transferring  files  between  hosts. HTTP  #  Hyper Text Transfer Protocol . An application level protocol  based on a request /reply  paradigm and used in WWW. ISDN #  Integrated Service Digital Network . A  digital  communication service  offered  by  telephone  carriers  and  standardized  by ITU-T . PROXY # an  agent sitting between  a  client  and  server that intercepts  messages  and  provides some  service . SMTP # Simple Mail  Transfer Protocol . The electronic  mail protocol of  the  internet . URL  #  Uniform Resource Locator. A  text  string used to identify  the location of  internet  resources.
What  is  firewall  ? A  firewall  is  a  specially  programmed  router  that  sits between  a  site  and  the  rest  of  the  network .  It  is  used  to  enforce security  policy . In simple words,  firewall  is  a  barrier  to  keep destructive forces away  from your  property .
2.why we need FIREWWALL  ? ,[object Object],[object Object],[object Object],[object Object]
Why  not  other  security mechanism  ? O f course,there are many  other mechanisms available  like  , cryptographic  algorithm , authentication protocols ,message  integrity  protocols, PGP,secure  shell,IP security(IPSEC)and  many more . When you tried to establish a  connection to a node using,say,IPSEC ,you would  have  to authenticate yourself as a valid  peer . There are  2 reasons  . Firstly , the  other security measures  described are not widely developed . Getting  security algorithms  and protocols  right  is very difficult task , and so FIREWALL have been devised as  a stop gap measure while we wait  for IPSEC . Secondly , it allows  the system  administrator to implement a  security policy in one centralized place .
HOW  FIREWALL  WORK  ?
WHAT  IT DOES  ? IF  you  know a  good bit about how  data  moves in  internet , and  you can  see easily  how a firewall helps protect computers  inside a large company . Let’s say  that  you work at  a company  with  500 employees . The company will therefore have hundreds of  computers that all  have  network cards connecting  them together . In addition , the  company will  have one or more connections to the internet  through something like t1 or t3  lines . Without  a firewall  in place, all  of those hundreds of computers are directly accessible to anyone on the internet . A person who knows what he or she is doing can probe those computers ,try  to make FTP connections to them , try to make TELNET connections to  them and so on. If one employee  makes  a  mistake and  leaves a  security  hole, hackers  can get  to the machine and exploit the  hole.  With a firewall in place, the  landscape is much different . A company will  place a firewall at every connection to the internet . The  firewall  can implement  security  rules.  A company can  set rules like this for FTP servers,web servers, telnet servers and  so on . In addition ,the company can can  control how  employees connect  to web sites,whether  files are allowed to leave the company over the network and so on . A FIREWALL gives  company  tremendous  control  over how people use the network.
Types  of  firewalls ? Firewalls  use one  or more of three  methods to control traffic flowing in and out of the network .  1 #  FILTER  BASED FIREWALL 2#  PROXY  BASED  FIREWALL 3#  STATEFUL  INSPECTION  Filter based firewalls are configured with  a  table of addresses  that  characterize  the packets they will , and will not, forward . By  addresses, we mean more than  just the destination’s IP address,although this in one possibility.  Ex : (*,*,128.7.6.5,80) Generally. Each entry in the table is a 4tuple : it gives  the IP address and TCP port number for both source and destination . It sometimes called as  LEVEL 4 SWITCHES. To understand proxy based firewalls works and why you would want one - consider a corporate web server,where the  company wants to make some the  servers page accessible  to all external users ,but it  wants  to  restrict  certain of the pages  to corporate users  at one or more remote sites .  Continues……...
The solution is to put an HTTP  proxy on the  firewall . Remote  users  establish  an  HTTP/TCP  connection  to  the  proxy ,  which  looks  at  the URL contained  in the request  message . If  the  requested  page  is  allowed  for  source  host,the proxy establishes a  second HTTP/TCP  connection  to the server  and forwards  the request  on  to the  server. The proxy  then forwards  the  response  in the  reverse direction  between  the two TCP  connection. A  newer  method  that  doesn’t examine  the  contents of  each packet but  instead compares  certain key parts of  the packet  to a  database of trusted  information. Information  traveling  from  inside the firewall to the  outside is  monitored  for specific defining characteristics . If  the comparison  yields a reasonable match, the  information  is allowed  through . Otherwise  it  is  discarded .
What  it  protects  you  from  ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We  conclude this  discussion  by observing that while a traditional  firewall  protects internal users  from  external users, it does nothing  to protect  or isolate internal  users  from  each other.  LIMITATIONS
The level of security you establish will  determine  how  many of  these  threats  can be  stopped  by  your firewall . The  highest level  of  security would  be  simply block everything  . Obviously that defeats the  purpose  of having  an  internet connection . But  a  common rule  of  thumb  is to block everything,then  begin to  select what  types  of  traffic you  will allow . One of  the best things about a firewall  from a security standpoint  is that it stops  anyone on the outside from logging onto a computer  in  your private network . While  this  is a big  deal  for businesses. In general,it  is  impossible for existing firewalls  to know who  is  accessing  the work and, therefore ,who has the  ability to  connect to  other machines on the network  .  Ultimately , security mechanisms like IPSEC are probably required to support such a level of security .  Still ,putting a  firewall  in place provides some “ peace  of  mind “.  conclusion

More Related Content

What's hot

What is firewall
What is firewallWhat is firewall
What is firewall
Harshana Jayarathna
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Firewalls
FirewallsFirewalls
Proxy Server
Proxy ServerProxy Server
Proxy Server
guest095022
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Firewall
FirewallFirewall
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Firewall
Firewall Firewall
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Dmz
Dmz Dmz
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Port forward
Port forwardPort forward
Port forward
lyndyv
 

What's hot (20)

What is firewall
What is firewallWhat is firewall
What is firewall
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Firewalls
FirewallsFirewalls
Firewalls
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall
Firewall Firewall
Firewall
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Dmz
Dmz Dmz
Dmz
 
Network security
Network securityNetwork security
Network security
 
LAN Security
LAN Security LAN Security
LAN Security
 
Port forward
Port forwardPort forward
Port forward
 

Viewers also liked

session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPN
Mustafa Jarrar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
Anthony Daniel
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
VIT University
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Viewers also liked (8)

session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPN
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Firewall

Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Firewall
FirewallFirewall
Firewall
Shivank Shah
 
Firewall
FirewallFirewall
Firewalls
FirewallsFirewalls
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
ssusera1b6c7
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 
Firewall ppt
Firewall pptFirewall ppt
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
Firewall
FirewallFirewall
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
RAVI RAJ
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
Revanth71
 
Firewall
FirewallFirewall
Firewall
Ahmed Elnaggar
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
Jezer Arces
 

Similar to Firewall (20)

Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
New internet security
New internet securityNew internet security
New internet security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 

More from nayakslideshare

Mips 64
Mips 64Mips 64
Digital Signature
Digital SignatureDigital Signature
Digital Signature
nayakslideshare
 
Spyware
SpywareSpyware
Gis
GisGis
Lcd
LcdLcd
Hyper Threading Technology
Hyper Threading TechnologyHyper Threading Technology
Hyper Threading Technology
nayakslideshare
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
nayakslideshare
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
nayakslideshare
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
nayakslideshare
 
Biochip
BiochipBiochip
Satellite Networks
Satellite NetworksSatellite Networks
Satellite Networks
nayakslideshare
 
Cybercrime
CybercrimeCybercrime
Cybercrime
nayakslideshare
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
nayakslideshare
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
nayakslideshare
 
Touch Screens
Touch ScreensTouch Screens
Touch Screens
nayakslideshare
 
Linux Security
Linux SecurityLinux Security
Linux Security
nayakslideshare
 
Dna Fingerprinting
Dna FingerprintingDna Fingerprinting
Dna Fingerprinting
nayakslideshare
 
Thinking Critically About WWW
Thinking Critically About WWWThinking Critically About WWW
Thinking Critically About WWW
nayakslideshare
 
Remote Sensing
Remote SensingRemote Sensing
Remote Sensing
nayakslideshare
 

More from nayakslideshare (20)

Mips 64
Mips 64Mips 64
Mips 64
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Spyware
SpywareSpyware
Spyware
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Gis
GisGis
Gis
 
Lcd
LcdLcd
Lcd
 
Hyper Threading Technology
Hyper Threading TechnologyHyper Threading Technology
Hyper Threading Technology
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Biochip
BiochipBiochip
Biochip
 
Satellite Networks
Satellite NetworksSatellite Networks
Satellite Networks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Touch Screens
Touch ScreensTouch Screens
Touch Screens
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Dna Fingerprinting
Dna FingerprintingDna Fingerprinting
Dna Fingerprinting
 
Thinking Critically About WWW
Thinking Critically About WWWThinking Critically About WWW
Thinking Critically About WWW
 
Remote Sensing
Remote SensingRemote Sensing
Remote Sensing
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Firewall

  • 1.
  • 2. COMPUER NETWORKS ARE TYPICALLY A SHARED RESOURCES USED BY MANY APPLICATIONS FOR MANY DIFFERENT PURPOSES. SOMETIMES THE DATA TRANSMITTED BETWEEN APPLICATION PROCESS IS CONFIDENTIAL, AND THE APPLICATIONS WOULD PREFER THAT OTHERS NOT BE ABLE TO READ IT .BUT THE PROBLEM ARISES WHEN SOMEONE ELSE WANT TO MANIPULATE WITH YOUR DATA .TO BUILD A SYSTEM THAT MINIMIZES THE RISK OF SECURITY,IS A DIFFICULT TASK. HOWEVER THERE ARE SOME ALOGORITHMS AND PROTOCOLS AVAILABLE. ONE OF THEM IS “FIREWALL”. INTRODUCTION
  • 3. KEY WORDS DSL # Digital Subscriber Line . A family of standards for transmitting data over twisted pair telephone lines at multi mega bit per second speeds. FTP # File Transfer Protocol . The standard protocol of the internet - architecture for transferring files between hosts. HTTP # Hyper Text Transfer Protocol . An application level protocol based on a request /reply paradigm and used in WWW. ISDN # Integrated Service Digital Network . A digital communication service offered by telephone carriers and standardized by ITU-T . PROXY # an agent sitting between a client and server that intercepts messages and provides some service . SMTP # Simple Mail Transfer Protocol . The electronic mail protocol of the internet . URL # Uniform Resource Locator. A text string used to identify the location of internet resources.
  • 4. What is firewall ? A firewall is a specially programmed router that sits between a site and the rest of the network . It is used to enforce security policy . In simple words, firewall is a barrier to keep destructive forces away from your property .
  • 5.
  • 6. Why not other security mechanism ? O f course,there are many other mechanisms available like , cryptographic algorithm , authentication protocols ,message integrity protocols, PGP,secure shell,IP security(IPSEC)and many more . When you tried to establish a connection to a node using,say,IPSEC ,you would have to authenticate yourself as a valid peer . There are 2 reasons . Firstly , the other security measures described are not widely developed . Getting security algorithms and protocols right is very difficult task , and so FIREWALL have been devised as a stop gap measure while we wait for IPSEC . Secondly , it allows the system administrator to implement a security policy in one centralized place .
  • 7. HOW FIREWALL WORK ?
  • 8. WHAT IT DOES ? IF you know a good bit about how data moves in internet , and you can see easily how a firewall helps protect computers inside a large company . Let’s say that you work at a company with 500 employees . The company will therefore have hundreds of computers that all have network cards connecting them together . In addition , the company will have one or more connections to the internet through something like t1 or t3 lines . Without a firewall in place, all of those hundreds of computers are directly accessible to anyone on the internet . A person who knows what he or she is doing can probe those computers ,try to make FTP connections to them , try to make TELNET connections to them and so on. If one employee makes a mistake and leaves a security hole, hackers can get to the machine and exploit the hole. With a firewall in place, the landscape is much different . A company will place a firewall at every connection to the internet . The firewall can implement security rules. A company can set rules like this for FTP servers,web servers, telnet servers and so on . In addition ,the company can can control how employees connect to web sites,whether files are allowed to leave the company over the network and so on . A FIREWALL gives company tremendous control over how people use the network.
  • 9. Types of firewalls ? Firewalls use one or more of three methods to control traffic flowing in and out of the network . 1 # FILTER BASED FIREWALL 2# PROXY BASED FIREWALL 3# STATEFUL INSPECTION Filter based firewalls are configured with a table of addresses that characterize the packets they will , and will not, forward . By addresses, we mean more than just the destination’s IP address,although this in one possibility. Ex : (*,*,128.7.6.5,80) Generally. Each entry in the table is a 4tuple : it gives the IP address and TCP port number for both source and destination . It sometimes called as LEVEL 4 SWITCHES. To understand proxy based firewalls works and why you would want one - consider a corporate web server,where the company wants to make some the servers page accessible to all external users ,but it wants to restrict certain of the pages to corporate users at one or more remote sites . Continues……...
  • 10. The solution is to put an HTTP proxy on the firewall . Remote users establish an HTTP/TCP connection to the proxy , which looks at the URL contained in the request message . If the requested page is allowed for source host,the proxy establishes a second HTTP/TCP connection to the server and forwards the request on to the server. The proxy then forwards the response in the reverse direction between the two TCP connection. A newer method that doesn’t examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics . If the comparison yields a reasonable match, the information is allowed through . Otherwise it is discarded .
  • 11.
  • 12. We conclude this discussion by observing that while a traditional firewall protects internal users from external users, it does nothing to protect or isolate internal users from each other. LIMITATIONS
  • 13. The level of security you establish will determine how many of these threats can be stopped by your firewall . The highest level of security would be simply block everything . Obviously that defeats the purpose of having an internet connection . But a common rule of thumb is to block everything,then begin to select what types of traffic you will allow . One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network . While this is a big deal for businesses. In general,it is impossible for existing firewalls to know who is accessing the work and, therefore ,who has the ability to connect to other machines on the network . Ultimately , security mechanisms like IPSEC are probably required to support such a level of security . Still ,putting a firewall in place provides some “ peace of mind “. conclusion