SlideShare a Scribd company logo
firewall
Girija sankar dash
EmbEtics solutions
INTRODUCTION
TYPES OF FIREWALL
HOW DOES A FIREWALL WORK
FIREWALL RULES
OVERVIEW
WHAT CAN A FIREWALL CAN/CANNOT DO
ARCHITECTURES FOR FIREWALL
CONCLUSION
INTRODUCTION
• A firewall may be a hardware, software, or a combination of
both.
• It is used to prevent unauthorized programs or Internet users
from accessing a private network and/or a single computer.
Types of firewall
SOFTWARE FIREWALL HARDWARE FIREWALL
 Protect a single computer  Protect an entire network
 Usually less expensive, easier to
configure
 Usually more expensive, harder to
configure
 Implemented on the router level
Norton Internet Security Cisco PIX
McAfee Internet Security NetScreen
Outpost WatchGuard
Ms. ISA Server Check Point
HOW DOES A FIREWALL WORK
• Inbound to or outbound from your computer.
• Inspects each “packet” of data that arrives at either side of the
firewall.
• Determines whether it should be allowed to pass through or if
it should be blocked.
sent
sentreceived
received
packets packets
How a firewall works ?
• Sniffing Mode
– An attacker tries to compromise a service on the protected
network.
– The Firewall identifies the attempt.
• The FIREWALL can now:
• Alert the admin
• Harden the firewall
• Or reset a TCP/IP connection
LOG
Alert
Reset
Fire Wall

FIREWALL RULES
• Allow – traffic that flows automatically because it has been
deemed
• Block – traffic that is blocked because it has been deemed
dangerous to your computer
• Ask – asks the user whether or not the traffic is allowed to
pass through
WHAT CAN A FIREWALL DO?
• Focus for security decisions
– Stop hackers from accessing our computer
• Can enforce security policy
– Protects our personal information
• Limits your exposure
– Blocks “pop up” ads and certain cookies
• Can log Internet activity efficiently
– Determines which programs can access the Internet
• Can't protect you against malicious insiders
• Can't protect you against connections that don't go through it
• Can't protect against completely new threats
• Can't protect against viruses
FIREWALL CAN…..
• Stop hackers from accessing your computer.
• Protects your personal information.
• Blocks “pop up” ads and certain cookies.
• Determines which programs can access the
Internet.
• Block invalid packets.
FIREWALL CANNOT…
• Cannot prevent e-mail viruses
– Only an antivirus product with updated definitions
can prevent e-mail viruses.
• After setting it initially, you cannot forget about
it
– The firewall will require periodic updates to the
rule sets and the software itself.
FIREWALL PROTECTS FROM
• Remote login
• SMTP session hijacking
• Operating system bugs
• Spam
• E-mail bombs
• Source routing
Architectures for
Firewall
• Single-Box Architecture
Architectures for
Firewall
• Screened Host Architecture
CONCLUSION
• There are many vulnerabilities in the internet, so firewall
protects us from these vulnerabilities.
• Firewall protect private files from the outsiders access.
QUERIES???
THANKS
VISIT US AT : www.embeticssolutions.com
Ph: 9090761446
For complete ppt just mail me us at info@embeticssolutions.com
If you find it helpful then like us on facebook :
https://www.facebook.com/pages/Embetics-
Solutions/318539438279689?ref=hl

More Related Content

What's hot

Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
Subrata Kumer Paul
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
Likan Patra
 
Firewall
FirewallFirewall
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
yogendrasinghchahar
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Firewall
FirewallFirewall
Firewall basics
Firewall basicsFirewall basics
Firewall basics
Sandeep Yadav
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
Soban Ahmad
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
Fredrick Hall
 
Firewall
FirewallFirewall
Firewall
thinkahead.net
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
poorvavyas4
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
Md Shihab
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
Firewall
FirewallFirewall

What's hot (20)

Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Firewall
FirewallFirewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 

Similar to Firewall girija ppt

Firewall
FirewallFirewall
Firewall
Nikhil Dagale
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
LakshayYadav46
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
fire walls
fire wallsfire walls
fire walls
iqra_ilyas
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
Muhammad Baqar Kazmi
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Firewall
FirewallFirewall
Firewall
Garmian
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
Anand992498
 
Seminar
SeminarSeminar
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
ReshmaBV2
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Firewalls
FirewallsFirewalls
Can a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activityCan a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activity
sameer farooq
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
ehsangha
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 
Firewall
FirewallFirewall
Firewall
Tapan Khilar
 

Similar to Firewall girija ppt (20)

Firewall
FirewallFirewall
Firewall
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
fire walls
fire wallsfire walls
fire walls
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Seminar
SeminarSeminar
Seminar
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Can a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activityCan a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activity
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Firewall
FirewallFirewall
Firewall
 

More from Girija Sankar Dash

QUAD COPTERS FULL PPT
QUAD COPTERS FULL PPTQUAD COPTERS FULL PPT
QUAD COPTERS FULL PPT
Girija Sankar Dash
 
Nano technology cooling full ppt
Nano technology cooling full pptNano technology cooling full ppt
Nano technology cooling full ppt
Girija Sankar Dash
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
Girija Sankar Dash
 
Speed cameras ppt full ...
Speed cameras ppt full ...Speed cameras ppt full ...
Speed cameras ppt full ...
Girija Sankar Dash
 
Speed Cameras BY GIRIJA SANKAR DASH
Speed Cameras BY GIRIJA SANKAR DASHSpeed Cameras BY GIRIJA SANKAR DASH
Speed Cameras BY GIRIJA SANKAR DASH
Girija Sankar Dash
 
Nano technology cooling girija edited
Nano technology cooling girija editedNano technology cooling girija edited
Nano technology cooling girija edited
Girija Sankar Dash
 

More from Girija Sankar Dash (6)

QUAD COPTERS FULL PPT
QUAD COPTERS FULL PPTQUAD COPTERS FULL PPT
QUAD COPTERS FULL PPT
 
Nano technology cooling full ppt
Nano technology cooling full pptNano technology cooling full ppt
Nano technology cooling full ppt
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
 
Speed cameras ppt full ...
Speed cameras ppt full ...Speed cameras ppt full ...
Speed cameras ppt full ...
 
Speed Cameras BY GIRIJA SANKAR DASH
Speed Cameras BY GIRIJA SANKAR DASHSpeed Cameras BY GIRIJA SANKAR DASH
Speed Cameras BY GIRIJA SANKAR DASH
 
Nano technology cooling girija edited
Nano technology cooling girija editedNano technology cooling girija edited
Nano technology cooling girija edited
 

Recently uploaded

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 

Recently uploaded (20)

ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 

Firewall girija ppt

  • 2. INTRODUCTION TYPES OF FIREWALL HOW DOES A FIREWALL WORK FIREWALL RULES OVERVIEW WHAT CAN A FIREWALL CAN/CANNOT DO ARCHITECTURES FOR FIREWALL CONCLUSION
  • 3. INTRODUCTION • A firewall may be a hardware, software, or a combination of both. • It is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer.
  • 4. Types of firewall SOFTWARE FIREWALL HARDWARE FIREWALL  Protect a single computer  Protect an entire network  Usually less expensive, easier to configure  Usually more expensive, harder to configure  Implemented on the router level Norton Internet Security Cisco PIX McAfee Internet Security NetScreen Outpost WatchGuard Ms. ISA Server Check Point
  • 5. HOW DOES A FIREWALL WORK • Inbound to or outbound from your computer. • Inspects each “packet” of data that arrives at either side of the firewall. • Determines whether it should be allowed to pass through or if it should be blocked. sent sentreceived received packets packets
  • 6.
  • 7. How a firewall works ? • Sniffing Mode – An attacker tries to compromise a service on the protected network. – The Firewall identifies the attempt. • The FIREWALL can now: • Alert the admin • Harden the firewall • Or reset a TCP/IP connection
  • 9. FIREWALL RULES • Allow – traffic that flows automatically because it has been deemed • Block – traffic that is blocked because it has been deemed dangerous to your computer • Ask – asks the user whether or not the traffic is allowed to pass through
  • 10. WHAT CAN A FIREWALL DO? • Focus for security decisions – Stop hackers from accessing our computer • Can enforce security policy – Protects our personal information • Limits your exposure – Blocks “pop up” ads and certain cookies • Can log Internet activity efficiently – Determines which programs can access the Internet
  • 11. • Can't protect you against malicious insiders • Can't protect you against connections that don't go through it • Can't protect against completely new threats • Can't protect against viruses
  • 12. FIREWALL CAN….. • Stop hackers from accessing your computer. • Protects your personal information. • Blocks “pop up” ads and certain cookies. • Determines which programs can access the Internet. • Block invalid packets.
  • 13. FIREWALL CANNOT… • Cannot prevent e-mail viruses – Only an antivirus product with updated definitions can prevent e-mail viruses. • After setting it initially, you cannot forget about it – The firewall will require periodic updates to the rule sets and the software itself.
  • 14. FIREWALL PROTECTS FROM • Remote login • SMTP session hijacking • Operating system bugs • Spam • E-mail bombs • Source routing
  • 17. CONCLUSION • There are many vulnerabilities in the internet, so firewall protects us from these vulnerabilities. • Firewall protect private files from the outsiders access.
  • 19. THANKS VISIT US AT : www.embeticssolutions.com Ph: 9090761446 For complete ppt just mail me us at info@embeticssolutions.com If you find it helpful then like us on facebook : https://www.facebook.com/pages/Embetics- Solutions/318539438279689?ref=hl