0% found this document useful (0 votes)
52 views

Presentation 1

Firewalls provide security between private networks and the internet. They control access and filter packets to protect systems from vulnerabilities, attacks, and unauthorized access. There are different types of firewalls that operate at different layers, with each having advantages and disadvantages regarding features, performance, and resource usage. Firewalls concentrate security, log network activity, and help enforce security policies, but cannot protect against all threats such as internal access or viruses.

Uploaded by

VEnki Rao
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Presentation 1

Firewalls provide security between private networks and the internet. They control access and filter packets to protect systems from vulnerabilities, attacks, and unauthorized access. There are different types of firewalls that operate at different layers, with each having advantages and disadvantages regarding features, performance, and resource usage. Firewalls concentrate security, log network activity, and help enforce security policies, but cannot protect against all threats such as internal access or viruses.

Uploaded by

VEnki Rao
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

INTERNET

FIREWALL

Protector of personal info


INTRODUCTION
• Internet is the bucket of information.
• It contain information about all level of
information e.g.
home,business,education ,etc.
• So it is necessary to access internet for
valuable information.
• By connecting a private network the
intruders interfere in your own systems
• firewalls provide this security. The
Internet
• firewalls keep the flames of Internet
hell out of your network or, to keep the
members of your LAN pure by denying
them access the all the evil Internet
temptations.
DEFINATION

• Firewall is the application that running between private network and internet
• 2 types of fire wall
1.Hardware firewall
2.Software firewall
• The first computer firewall was a nonrouting Unix host with connections to
two different networks
• To keepspeople(worm.cracker)out.
• To people (employees/children)in.
NEED OF FIREWALL

• What happens if we do not


use use firewall?
• subnet's systems expose themselves to
inherently insecure services such as
NFS or NIS and to probes and attacks
from hosts elsewhere on the network.
• network security relies totally on host
security and all hosts must, in a sense,
cooperate to achieve a uniformly high
level of security.
• The larger the subnet, the less
manageable it is to maintain all hosts
at the same level of security.
FIREWALL APPROACH
• it provides numerous advantages
to sites by helping to increas
overall host security
1. Protection from Vulnerable
Services
2. Controlled Access to Site Systems
3. Concentrated Security
4. Enhanced Privacy
5. Logging and Statistics on Network
Use, Misuse
6. Policy Enforcement
PROTECTION FROM VULNERABLE SERVICES

• improve network security and


reduce risks to hosts on the subnet
• prohibit certain vulnerable services
such as NFS from entering or
leaving aprotected subnet
• permits the use of these services
with greatly reduced risk to
exploitation
• protection from routing-based
attacks
• reject all source-routed
• packets and ICMP redirects and
then inform administrators of the
incidents
CONTROLLED ACCESS TO SITE SYSTEMS

• Ability to control access


to site systems.
• Do not provide access to
hosts or services that do
not require access
• A user requires little or
no network access to
her desktop workstation,
then a firewall can
enforce this policy
CONCENTRATED SECURITY

• most modified additional


security software could be
located on the firewall systems
as opposed to being distributed
on many hosts.
• opposed to each system that
needed to be accessed from the
Internet.
• Kerberos [NIST94c] involve
modifications at each host
system.
• simpler to implement to run
specialized software.
ENHANCED PRIVACY

• Normally be considered
innocuous information that
would be useful to an attacker.
• Some sites wish to block
services such as finger and
Domain Name Service.
• Firewall used to block DNS
information about site
systems.
• The names and IP addresses
systems would not be
available to Internet hosts.
LOGGING AND STATISTICS ON NETWORK USE, MISUSE

• firewall can log accesses and


provide valuable statistics about
network usage
• with appropriate alarms that
sound when firewall and
network are being probed or
attacked
• primary importance:
1. whether the firewall is
withstanding probes attacks.
2. controls on the firewall are
adequate.
3. Network usage statistics
POLICY ENFORCEMENT

• A firewall provides the


means for implementing
and enforcing a network
access policy.
• A network access policy can
be enforced by a firewall,
• Depends entirely on the
cooperation of users.
• It cannot nor should not
depend on Internet users in
general.
TYPES OF FIREWALLS
1.packet filtering firewalls
2.circuitlevel gateways
3.application gateways
4.stateful multilayer
inspection firewall
PACKET FILTERING FIREWALLS
• Work at the network
layer of OSI model, or IP
layer of TCP/IP
• Usually part of a router
• Each packet is compared
to a set of criteria before
it is forwarded.
• These firewalls often
contain an ACL (Access
Control List)
ADVANTAGE…
• Cost effective to simply
configure routers
• Network layer firewalls tend to
be fast and tend to be
transparent to users.
• Virtually all high-speed Internet
connections require a router.
• Capability to perform basic
Packet Filtering at the Router
level without purchasing
additional hardware or
software.
DISADVANTAGE
• They don’t provide for
password controls.
• Users can’t identify themselves.
• The person who configures the
firewall protocol for the router
needs a thorough knowledge of
IP packet structure.
• There is no user authentication.
• Remains vulnerable to attacks
such as spoofing source
address.
CIRCUIT-LEVEL GATEWAYS

• These firewalls work at the


session layer of the OSI model,
or TCP/IP layer of the TCP/IP.
• Monitor TCP handshaking
between packets to determine
whether a requested session is
legitimate.
• Useful for hiding information
about protected networks
• Relatively inexpensive and have
the advantage of hiding
information about the private
network they protect.
• They do not filter individual
packets
APPLICATION GATEWAYS
• These are the software
firewalls
• Often used by companies
specifically to monitor
and log employee activity
to protect a home
computer from hackers
• Filter packets at the
application layer of OSI or
TCP/IP model
DUAL HOMED GATEWAY

• A highly secured host


that runs proxy
software.
• It has two network
interfaces, one on each
network, and blocks all
traffic passing through
it.
ADVANTAGE
• A very fine level of security
and access control may be
achieved.
• These reject all inbound
packets contain common EXE
and COM files.
• No direct connections are
allowed through the firewall
under any circumstances.
• Proxies provide a high level of
protection against denial of
service attacks.
DISADVANTAGE
• Proxies require large
amount of computing
resources in the host
system, which can load to
performance bottlenecks or
slow downs the network.
• Proxies must be written for
specific application
programs and not all
applications have proxies
available.
STATEFUL MULTILAYER INSPECTION FIREWALL

• Keeps track of all packets


associated with a specific
communication session
• A typical communication
session between two
computers will consists a
several thousand packets
• Close off ports until
connection to the
specified port is
requested.
Advantage and disadvantage
• These will typically offer much
higher performance than proxies.
• These ensure that all packets must
be a port of an authorized
communication session.
• Stateful Inspection provides a
greater level of security control by
enforcing security
Disadvantage:
• Stateful inspection functionality
currently requires the purchase of
additional hardware and/or software
and is not typically "bundled" with
another existing network device.
A SIMPLE EXAMPLE OF FIREWALLL
• CISCO developed 500 series firewall as
better because they use a cut-through
protocol in packet examination.
• Firewalls create barriers in order to prevent
unauthorized access to a network.
• They are the security doors through which
some people (i.e. data) may pass and others
may not.
• It adds another layer of security to your
systems.
• It protects networked computers from
intentional hostile intrusion that could
• Compromise confidentiality or result in data
corruption or denial of service.
• It is is a choke point through which all the
traffic flows between two network.
ADVANTAGE OF FIREWALL
• Concentration of security

• Protocol filtering

• Information hiding

• Application gateways ,

• Extended logging

• Centralized and simplified


network services management
DISADVANTAGE OF FIREWALL
• Certain types of network
access may be hampered
for some hosts, telnet, ftp, X
Windows, NFS, NIS, etc
• A firewall system is that it
concentrates security in one
spot as opposed to
distributing it among system.
• The term ``firewall'' can
mean many things to many
people.
FOR WHICH FIREWALLS CAN’T PROVIDE SECURITY

• A firewall can’t protect against attacks


that don’t go through the firewall.
• Many organizations that are terrified of
Internet connections have no coherent
policy about how dial-in access via
modems should be protected.
• There are many organizations out there
buying expensive firewalls and
neglecting the numerous other back
doors into their network.
• Another thing a firewall can’t really
protect you against is traitors or idiots
inside the network.
• Firewalls can't protect well against
things like viruses.
CONCLUSION
• In conclusion inter net is the
dangerous place..
• Without firewall not
connected to inter net.
• Fire wall protect private file
from outsiders.
• Hackers crackers and viruses
are harm full for personal
data.
• Firewall provide necessary
security for such type of
illegal access.

You might also like