SlideShare a Scribd company logo
1 of 13
Firewall
First line defense
Submitted to: Dr. Rehan Ali Syed
Presented By: Muhammad Saood Choudhary(20 CSE-27)
Abdul Mubeen(20 CSE-22)
Subject: Network Security & Cryptography
What is Firewall?
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established
security policies.
A firewall is essentially the barrier that sits between a private internal network
and the public Internet.
Purpose of Firewall
• Blocks Unauthorized Access: Protects private information from unapproved
users.
• Monitors & Manages Traffic: Watches over network activity to spot and
stop odd behavior, enhancing performance and stability.
• Prevents Malware: Blocks harmful software like viruses.
• Application Control: Decides which apps can access the network based on
set rules.
• Stops Intrusions & Protects Privacy: Prevents attacks and keeps personal
data safe from being stolen or exposed.
Inbound Traffic:
• This refers to external data entering your network.
• Firewall rules for inbound traffic typically restrict access to protect against
unauthorized entry and attacks from outside sources.
Outbound Traffic:
• This is the data exiting your network to the internet or another network.
• Outbound rules can prevent sensitive information from leaving your
network and block users from accessing potentially dangerous external sites
or services.
How Firewall works?
Packet Filtering:
Inspect: Checks data for basic details like where it's from and where it's going.
Rules: Uses simple rules to see if the data should be let through or not.
Decision: Either lets the data pass or blocks it based on these rules.
Stateful Inspection:
Track: Keeps an eye on ongoing data exchanges to get the full picture.
Context: Looks at the data within its conversation, not just in isolation.
Smart Choices: Decides on allowing or blocking data based on its conversation history.
How Firewall works?
Proxy Services:
Middleman: Stands between you and the internet, checking everything.
Check-up: Reviews all requests and responses thoroughly.
Content Rules: Decides what's okay to view or exchange based on detailed content checks.
Intrusion Prevention System (IPS):
Anomaly Spotter: Looks for odd patterns that could mean trouble.
Attack Blocker: Stops threats in their tracks, automatically.
Rule Updater: Constantly learns new threat patterns to protect the network better.
Types of Firewall
Type Function Advantage Disadvantage
Packet Filtering
Firewalls
Filters traffic based on IP,
ports, protocols
Simple, cost-effective Limited threat detection
Proxy Firewalls
Intermediates, inspecting
content
High content-based
security
Slows traffic
Circuit-Level Gateways
Verifies sessions without
content inspection
Efficient Lower security level
Web Application
Firewalls
Filters HTTP traffic for
web apps
Protects against web
attacks
Limited to web
applications
Cloud Firewalls
Cloud-based network
security
Scalable, easy
management
Depends on cloud,
privacy issues
Deployment
1.Network Perimeter Deployment
Location: Edge of the network, between internal and external networks.
Purpose: Protects against external threats and controls data flow.
2.Internal Segmentation
Location: Inside the network, dividing it into zones.
Purpose: Limits threat spread by controlling traffic between zones, like
separating corporate and production areas.
Deployment
3.Data Center Deployment
Location: At or within data centers.
Purpose: Secures critical infrastructure and information by controlling access.
4.Endpoint Protection
Location: On devices like laptops and mobiles.
Purpose: Protects devices from threats, especially off-network, by managing
device-level traffic.
Forms of Firewall
Hardware Firewall:
What it is: A separate device connected between your network and the internet.
Use Cases: Best for protecting all devices on a network, commonly used by businesses.
Advantages: Offers strong security without slowing down your devices; often has extra features like
VPN and intrusion prevention.
Software Firewall:
What it is: A program installed on individual computers or servers.
Use Cases: Good for custom protection on single devices.
Advantages: Provides control over what internet traffic can enter or leave each app on a device, great
for defending against internal risks.
THANK YOU FOR
LISTENING
@idiots

More Related Content

Similar to Firewall By Saood N Mubeen for network security.pptx

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
ezoicxcom
 

Similar to Firewall By Saood N Mubeen for network security.pptx (20)

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Firewall
FirewallFirewall
Firewall
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?Why is Firewall Important for Network Security?
Why is Firewall Important for Network Security?
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Firewall
FirewallFirewall
Firewall
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Computing security ppt for firewall and its application.pptx
Computing security ppt for firewall and its application.pptxComputing security ppt for firewall and its application.pptx
Computing security ppt for firewall and its application.pptx
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Firewall By Saood N Mubeen for network security.pptx

  • 2. Submitted to: Dr. Rehan Ali Syed Presented By: Muhammad Saood Choudhary(20 CSE-27) Abdul Mubeen(20 CSE-22) Subject: Network Security & Cryptography
  • 3. What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. A firewall is essentially the barrier that sits between a private internal network and the public Internet.
  • 4. Purpose of Firewall • Blocks Unauthorized Access: Protects private information from unapproved users. • Monitors & Manages Traffic: Watches over network activity to spot and stop odd behavior, enhancing performance and stability. • Prevents Malware: Blocks harmful software like viruses. • Application Control: Decides which apps can access the network based on set rules. • Stops Intrusions & Protects Privacy: Prevents attacks and keeps personal data safe from being stolen or exposed.
  • 5. Inbound Traffic: • This refers to external data entering your network. • Firewall rules for inbound traffic typically restrict access to protect against unauthorized entry and attacks from outside sources. Outbound Traffic: • This is the data exiting your network to the internet or another network. • Outbound rules can prevent sensitive information from leaving your network and block users from accessing potentially dangerous external sites or services.
  • 6. How Firewall works? Packet Filtering: Inspect: Checks data for basic details like where it's from and where it's going. Rules: Uses simple rules to see if the data should be let through or not. Decision: Either lets the data pass or blocks it based on these rules. Stateful Inspection: Track: Keeps an eye on ongoing data exchanges to get the full picture. Context: Looks at the data within its conversation, not just in isolation. Smart Choices: Decides on allowing or blocking data based on its conversation history.
  • 7. How Firewall works? Proxy Services: Middleman: Stands between you and the internet, checking everything. Check-up: Reviews all requests and responses thoroughly. Content Rules: Decides what's okay to view or exchange based on detailed content checks. Intrusion Prevention System (IPS): Anomaly Spotter: Looks for odd patterns that could mean trouble. Attack Blocker: Stops threats in their tracks, automatically. Rule Updater: Constantly learns new threat patterns to protect the network better.
  • 8. Types of Firewall Type Function Advantage Disadvantage Packet Filtering Firewalls Filters traffic based on IP, ports, protocols Simple, cost-effective Limited threat detection Proxy Firewalls Intermediates, inspecting content High content-based security Slows traffic Circuit-Level Gateways Verifies sessions without content inspection Efficient Lower security level Web Application Firewalls Filters HTTP traffic for web apps Protects against web attacks Limited to web applications Cloud Firewalls Cloud-based network security Scalable, easy management Depends on cloud, privacy issues
  • 9. Deployment 1.Network Perimeter Deployment Location: Edge of the network, between internal and external networks. Purpose: Protects against external threats and controls data flow. 2.Internal Segmentation Location: Inside the network, dividing it into zones. Purpose: Limits threat spread by controlling traffic between zones, like separating corporate and production areas.
  • 10. Deployment 3.Data Center Deployment Location: At or within data centers. Purpose: Secures critical infrastructure and information by controlling access. 4.Endpoint Protection Location: On devices like laptops and mobiles. Purpose: Protects devices from threats, especially off-network, by managing device-level traffic.
  • 11. Forms of Firewall Hardware Firewall: What it is: A separate device connected between your network and the internet. Use Cases: Best for protecting all devices on a network, commonly used by businesses. Advantages: Offers strong security without slowing down your devices; often has extra features like VPN and intrusion prevention. Software Firewall: What it is: A program installed on individual computers or servers. Use Cases: Good for custom protection on single devices. Advantages: Provides control over what internet traffic can enter or leave each app on a device, great for defending against internal risks.
  • 12.