SlideShare a Scribd company logo
Introductory Video

(This has to be shown for 1 min only)
Firewalls

Group 2Section C
Avishek
Dasgupta
Tarun Gupta ()
Siddharth
Gautam (13P172)
Kanika Vimani
TThreats:
•Theft or
disclosure of
internal data
•Unauthorized
access to internal
hosts
•Interception or
alteration of data
•Vandalism or
denial of service
Firewall
System or set of systems designed to:
• Permit or deny network
transmissions
• Used to protect networks from
unauthorized access
• Permit legitimate communication to
pass
• Protect data integrity of critical
information
TYPES OF FIREWALL
• Network firewalls:
 Protect the perimeter of a network by
watching traffic that enters and leaves
 Simple router or “traditional” network layer
firewall
 Modern network layer firewalls
TYPES OF FIREWALL
• Application-layer firewalls:
 Host-run proxy servers
 Early application layer firewalls are not
particularly transparent to end users and may
require some training. Modern application
layer firewalls are often fully transparent
TYPES OF FIREWALL
Hybrid firewalls:
Network
layer
firewalls
have
become
increasingly
“aware”
of
the
information
going
through them

Application
layer
firewalls
have
become
increasingly
“low
level”
and
transparent

• Fast packet-screening systems that log and audit data as
they pass through the system
• Increasingly, firewalls (network and application layer)
incorporate encryption so that they may protect traffic
passing between them over the Internet
Anti-virus vs. Firewall

Scanning Software - disinfects an infected
computer

Search files, incoming, outgoing, and
stored on hard drives and other storage
devices which can be potentially
hazardous to your internal network or PC

Filtering device - prevents the computer from
getting outward
Control or regulate theinfected bound traffic
from your internal network to sites outside
and prevent access to sites not considered
appropriate
How Firewalls Work

Firewalls uses one of the three methods to control
traffic flowing in and out of the network:

Packet Filtering
Proxy Service
Stateful Inspection
Video to exhibit Firewall’s
functioning
Classification based on working
Principle

Stateful
Inspection

Packet
Filtering
Firewalls as filters
Firewalls as filters
• When TCP/IP sends data packets they seldom go
straight from the host system that generated them
to the client that requested them. Along the way
they normally pass through one or more routers
• Routers look at the address information in TCP/IP
packets and direct them accordingly
• For Example, Data packets transmitted over the
Internet from the Web browser on a PC in Gurgaon
to a Web server in Bangalore will pass through
numerous routers along the way, each of which
makes decisions about where to direct the traffic
Firewalls as filters
• Routers make
their routing
decisions based
on tables of data
and rules. It is
possible to
manipulate these
rules by means
of filters so
that, for
example, only
data from
Firewalls as Gateways
Firewalls as Gateways
• A gateway is a
computer that
provides relay
services between
two networks
• Traffic goes to
the gateway
instead of
directly entering
the connected
network.
• The gateway
machine then
Firewalls as Gateways
• Typically, the two
gateways will have
more open
communication
through the inside
filter than the
outside gateway has
to other internal
hosts. The outside
filter can be used to
protect the gateway
from attack, while
the inside gateway is
used to guard against
Firewalls as Control
Points
Firewalls as Control
Points
• Firewalls can
provide
additional
security services
including traffic
encryption and
decryption
• In order to
communicate in
encryption
mode, the
sending and
receiving
firewalls must
use compatible
encrypting
systems
Firewalls for Small
Offices and Home Offices
• Now that high-speed, always-on Internet
connectivity is becoming more and more
common, so too are attacks against
connected computers and hence it has
become very important to protect our
personal computers.
• Firewalls help us by:
– screening out many types of malicious traffic
– keep your computer from participating in
attacks on others without your knowledge

• Firewall products come in many different
forms, from freely available software
for your computer to tamper-resistant
industrial units
• For maximum security, the most reliable
Internet Connection
Firewall (ICF)
• To prevent unsolicited traffic from the
public side of the connection from
entering the private side
• To thwart common hacking attempts (such
as port scanning), the firewall drops
communications that originate from the
Internet.
• ICF silently discards unsolicited
communications
• ICF blocks the following kinds:
• Scans
• Many Trojans
How a hardware firewall
is connected?
Firewalls for Enterprises
• Corporate networks employ
layers of defence:
– traffic screening at the router
connecting the network to the Internet
– one or more enterprise-class
firewalls
– virus scanning engines on the email
servers
– and some kind of intrusion detection
mechanism

• Do host based firewalls make
sense in corporate network?
Demilitarized zone
• DMZ is a computer host or small network
inserted as a "neutral zone" between a
company's private network and the outside
public network
• DMZs allow computers behind the firewall
to initiate requests outbound to the DMZ
• Computers in the DMZ in turn
respond, forward or re-issue requests out
to the Internet or other public network
• The LAN firewall, though, prevents
computers in the DMZ from initiating
Demilitarized zone
Future of Firewall
• 596 million Internet users in China
were attacked by viruses and
malware in the first half of 2010
• Current Systems are obsoleting fast
• Vendors are Focusing on developing
"next-generation firewalls”
• Superior protection without
bottlenecking the system
performance
• Enterprise Firewall – The Next
Thank You !!

More Related Content

What's hot

Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
Subrata Kumer Paul
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
E firewalls
E firewallsE firewalls
E firewalls
Abhiroop Ghatak
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
What is firewall
What is firewallWhat is firewall
What is firewall
Harshana Jayarathna
 
Firewall
FirewallFirewall
Firewalls
FirewallsFirewalls
fire walls
fire wallsfire walls
fire walls
iqra_ilyas
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
Yovan Chandel
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Firewall
FirewallFirewall
Firewall
Tapan Khilar
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
Student
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 
Firewall
FirewallFirewall
Firewall
Husumihadi
 
FireWall
FireWallFireWall
FireWallrubal_9
 

What's hot (20)

Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
E firewalls
E firewallsE firewalls
E firewalls
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
fire walls
fire wallsfire walls
fire walls
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall
FirewallFirewall
Firewall
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall
FirewallFirewall
Firewall
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Firewall
FirewallFirewall
Firewall
 
FireWall
FireWallFireWall
FireWall
 

Similar to Section c group2_firewall_ final

Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
karthikvcyber
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
marghali
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
Zara Nawaz
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
crisma baby mathew
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
Anand992498
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
LakshayYadav46
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
Moin Islam
 

Similar to Section c group2_firewall_ final (20)

Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Network security
 Network security Network security
Network security
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 

More from pg13tarun_g

Us wine industry section c_group2
Us wine industry section c_group2Us wine industry section c_group2
Us wine industry section c_group2
pg13tarun_g
 
10 section c group10_innovating for sharedvalue (2)
10 section c group10_innovating for sharedvalue (2)10 section c group10_innovating for sharedvalue (2)
10 section c group10_innovating for sharedvalue (2)pg13tarun_g
 
8 section c group 8 - un global compact - 6 march 2014 - v1
8 section c   group 8 - un global compact - 6 march 2014 - v18 section c   group 8 - un global compact - 6 march 2014 - v1
8 section c group 8 - un global compact - 6 march 2014 - v1pg13tarun_g
 
7 csr group 7 section c_disruptive innovation for social change
7 csr group 7  section c_disruptive innovation for social change7 csr group 7  section c_disruptive innovation for social change
7 csr group 7 section c_disruptive innovation for social changepg13tarun_g
 
5 mainstreaming csr group 5 setion_c (1)
5 mainstreaming csr group 5 setion_c (1)5 mainstreaming csr group 5 setion_c (1)
5 mainstreaming csr group 5 setion_c (1)pg13tarun_g
 
4 civil learning tool
4 civil learning tool4 civil learning tool
4 civil learning toolpg13tarun_g
 
9 csr shared value
9   csr shared value9   csr shared value
9 csr shared valuepg13tarun_g
 
Sec c strategy and society (1)
Sec c strategy and society (1)Sec c strategy and society (1)
Sec c strategy and society (1)
pg13tarun_g
 
Manpower analysis
Manpower analysisManpower analysis
Manpower analysispg13tarun_g
 

More from pg13tarun_g (10)

Us wine industry section c_group2
Us wine industry section c_group2Us wine industry section c_group2
Us wine industry section c_group2
 
10 section c group10_innovating for sharedvalue (2)
10 section c group10_innovating for sharedvalue (2)10 section c group10_innovating for sharedvalue (2)
10 section c group10_innovating for sharedvalue (2)
 
8 section c group 8 - un global compact - 6 march 2014 - v1
8 section c   group 8 - un global compact - 6 march 2014 - v18 section c   group 8 - un global compact - 6 march 2014 - v1
8 section c group 8 - un global compact - 6 march 2014 - v1
 
7 csr group 7 section c_disruptive innovation for social change
7 csr group 7  section c_disruptive innovation for social change7 csr group 7  section c_disruptive innovation for social change
7 csr group 7 section c_disruptive innovation for social change
 
5 mainstreaming csr group 5 setion_c (1)
5 mainstreaming csr group 5 setion_c (1)5 mainstreaming csr group 5 setion_c (1)
5 mainstreaming csr group 5 setion_c (1)
 
4 civil learning tool
4 civil learning tool4 civil learning tool
4 civil learning tool
 
9 csr shared value
9   csr shared value9   csr shared value
9 csr shared value
 
Sec c strategy and society (1)
Sec c strategy and society (1)Sec c strategy and society (1)
Sec c strategy and society (1)
 
Manpower analysis
Manpower analysisManpower analysis
Manpower analysis
 
Mexican economy
Mexican economyMexican economy
Mexican economy
 

Recently uploaded

Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 

Recently uploaded (20)

Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 

Section c group2_firewall_ final

  • 1. Introductory Video (This has to be shown for 1 min only)
  • 2. Firewalls Group 2Section C Avishek Dasgupta Tarun Gupta () Siddharth Gautam (13P172) Kanika Vimani
  • 3.
  • 4.
  • 5.
  • 6. TThreats: •Theft or disclosure of internal data •Unauthorized access to internal hosts •Interception or alteration of data •Vandalism or denial of service
  • 7. Firewall System or set of systems designed to: • Permit or deny network transmissions • Used to protect networks from unauthorized access • Permit legitimate communication to pass • Protect data integrity of critical information
  • 8. TYPES OF FIREWALL • Network firewalls:  Protect the perimeter of a network by watching traffic that enters and leaves  Simple router or “traditional” network layer firewall  Modern network layer firewalls
  • 9. TYPES OF FIREWALL • Application-layer firewalls:  Host-run proxy servers  Early application layer firewalls are not particularly transparent to end users and may require some training. Modern application layer firewalls are often fully transparent
  • 10. TYPES OF FIREWALL Hybrid firewalls: Network layer firewalls have become increasingly “aware” of the information going through them Application layer firewalls have become increasingly “low level” and transparent • Fast packet-screening systems that log and audit data as they pass through the system • Increasingly, firewalls (network and application layer) incorporate encryption so that they may protect traffic passing between them over the Internet
  • 11. Anti-virus vs. Firewall Scanning Software - disinfects an infected computer Search files, incoming, outgoing, and stored on hard drives and other storage devices which can be potentially hazardous to your internal network or PC Filtering device - prevents the computer from getting outward Control or regulate theinfected bound traffic from your internal network to sites outside and prevent access to sites not considered appropriate
  • 12. How Firewalls Work Firewalls uses one of the three methods to control traffic flowing in and out of the network: Packet Filtering Proxy Service Stateful Inspection
  • 13. Video to exhibit Firewall’s functioning
  • 14. Classification based on working Principle Stateful Inspection Packet Filtering
  • 16. Firewalls as filters • When TCP/IP sends data packets they seldom go straight from the host system that generated them to the client that requested them. Along the way they normally pass through one or more routers • Routers look at the address information in TCP/IP packets and direct them accordingly • For Example, Data packets transmitted over the Internet from the Web browser on a PC in Gurgaon to a Web server in Bangalore will pass through numerous routers along the way, each of which makes decisions about where to direct the traffic
  • 17. Firewalls as filters • Routers make their routing decisions based on tables of data and rules. It is possible to manipulate these rules by means of filters so that, for example, only data from
  • 19. Firewalls as Gateways • A gateway is a computer that provides relay services between two networks • Traffic goes to the gateway instead of directly entering the connected network. • The gateway machine then
  • 20. Firewalls as Gateways • Typically, the two gateways will have more open communication through the inside filter than the outside gateway has to other internal hosts. The outside filter can be used to protect the gateway from attack, while the inside gateway is used to guard against
  • 22. Firewalls as Control Points • Firewalls can provide additional security services including traffic encryption and decryption • In order to communicate in encryption mode, the sending and receiving firewalls must use compatible encrypting systems
  • 23. Firewalls for Small Offices and Home Offices • Now that high-speed, always-on Internet connectivity is becoming more and more common, so too are attacks against connected computers and hence it has become very important to protect our personal computers. • Firewalls help us by: – screening out many types of malicious traffic – keep your computer from participating in attacks on others without your knowledge • Firewall products come in many different forms, from freely available software for your computer to tamper-resistant industrial units • For maximum security, the most reliable
  • 24. Internet Connection Firewall (ICF) • To prevent unsolicited traffic from the public side of the connection from entering the private side • To thwart common hacking attempts (such as port scanning), the firewall drops communications that originate from the Internet. • ICF silently discards unsolicited communications • ICF blocks the following kinds: • Scans • Many Trojans
  • 25. How a hardware firewall is connected?
  • 26. Firewalls for Enterprises • Corporate networks employ layers of defence: – traffic screening at the router connecting the network to the Internet – one or more enterprise-class firewalls – virus scanning engines on the email servers – and some kind of intrusion detection mechanism • Do host based firewalls make sense in corporate network?
  • 27. Demilitarized zone • DMZ is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network • DMZs allow computers behind the firewall to initiate requests outbound to the DMZ • Computers in the DMZ in turn respond, forward or re-issue requests out to the Internet or other public network • The LAN firewall, though, prevents computers in the DMZ from initiating
  • 29. Future of Firewall • 596 million Internet users in China were attacked by viruses and malware in the first half of 2010 • Current Systems are obsoleting fast • Vendors are Focusing on developing "next-generation firewalls” • Superior protection without bottlenecking the system performance • Enterprise Firewall – The Next

Editor's Notes

  1.  A simple router is the ``traditional'' network layer firewall, since it is not able to make particularly sophisticated decisions about what a packet is actually talking to or where it actually came from. Modern network layer firewalls have become increasingly sophisticated, and now maintain internal information about the state of connections passing through them, the contents of some of the data streamsSoftware-based Microsoft’s Internet Security and Acceleration (ISA) Server or the hardware-based Nortel Networks Alteon Switched Firewall Systemcorporate internet access management and total network defence against any external unwarranted interference.Host-based firewalls, such as Internet Connection Firewall (ICF—included with Windows XP and Windows Server 2003), protect an individual computer regardless of the network it’s connected to.
  2. These generally are hosts running proxy servers, which permit no traffic directly between networks, and which perform elaborate logging and auditing of traffic passing through them. Since the proxy applications are software components running on the firewall, it is a good place to do lots of logging and access control. Application layer firewalls can be used as network address translators, since traffic goes in one ``side'' and out the other, after having passed through an application that effectively masks the origin of the initiating connection. Having an application in the way in some cases may impact performance and may make the firewall less transparent. Early application layer firewalls such as those built using the TIS firewall toolkit, are not particularly transparent to end users and may require some training. Modern application layer firewalls are often fully transparent. Application layer firewalls tend to provide more detailed audit reports and tend to enforce more conservative security models than network layer firewalls.
  3. Application layer firewalls have become increasingly “low level” and transparent
  4. Milan
  5. Milan