Lecture 31
Lecture 31
Lecture # 31
1
Objectives
• Introduction to Firewall.
2
Firewall
• Firewalls are network security products that monitor
and filter internal or outgoing network traffic
according to an organization's security policies.
3
Firewall (Cont..)
• Firewalls are network security systems that prevent
unauthorized access to a network.
4
Firewall (Cont..)
• Firewalls are vital to network security and are used in
both enterprise and personal environments.
5
Firewall (Cont..)
• A firewall is a device or software in a network that
controls incoming and outgoing network traffic
according to predetermined security rules.
6
Firewall (Cont..)
• It can be set up as a barrier between an internal
trusted network and external untrusted networks, such
as the Internet, and typically allows only authorized
traffic while blocking potentially harmful data.
7
Firewall (Cont..)
Key Functions of Firewalls:
Traffic Filtering:
• Firewalls screen data packets (pieces of data) in the
network's flow-in and flow-out directions, allowing
or blocking them according to certain rules.
8
Firewall (Cont..)
Key Functions of Firewalls:
Access Control:
• They decide which applications, services, and devices
can access the network, thus protecting sensitive
resources.
9
Firewall (Cont..)
Key Functions of Firewalls:
Threat Detection:
• Some of them can detect and prevent other types of
threats, such as viruses, malware, or even suspicious
behavior.
10
Firewall (Cont..)
Types of Firewalls:
• It can be software or hardware.
11
Firewall (Cont..)
Types of Firewalls:
• Hardware firewalls are devices set up between the
gateway and your network.
12
Firewall (Cont..)
Types of Firewalls:
Packet Filtering
• A packet filtering firewall controls incoming and
outgoing traffic across a network.
13
Firewall (Cont..)
Types of Firewalls:
Packet Filtering
• It allows or rejects the flow of data depending on the
packet's source address, destination address,
application protocols involved in transmitting the
data, and more.
14
Firewall (Cont..)
Types of Firewalls:
Proxy Service Firewall
• This type of firewall works by filtering messages at
the application layer in the network's interest.
15
Firewall (Cont..)
Types of Firewalls:
Stateful Inspection
• A firewall permits or blocks network traffic based on
state, port, and protocol.
16
Firewall (Cont..)
Types of Firewalls:
Next-Generation Firewall
• Next-generation firewall is a deep-packet inspection
firewall that adds application-level inspection,
intrusion prevention, and information from outside
the firewall to go beyond port/protocol inspection and
blocking.
17
Firewall (Cont..)
Types of Firewalls:
Unified Threat Management (UTM) Firewall
• A UTM device combines a stateful inspection
firewall, intrusion prevention, and antivirus
functionalities in a loose coupling.
18
Firewall (Cont..)
Types of Firewalls:
Web Application Firewall
• It is a security solution that is used for filtering and
monitoring inbound and outbound HTTP/HTTPS
traffic towards or from a web application known as
WAF.
19
Firewall (Cont..)
Types of Firewalls:
Web Application Firewall
• It protects against various threats targeting web
applications, including SQL injection, cross-site
scripting attacks, and other standard web weaknesses.
20
Firewall (Cont..)
Types of Firewalls:
Web Application Firewall
• The WAF works at the application layer by
obstructing malicious inputs and suspicious activities
before they get to the web server.
21
Firewall (Cont..)
Types of Firewalls:
Web Application Firewall
• It will help prevent attacks on the OWASP Top 10
lists and provide real-time threat detection and bot
mitigation to ensure integrity in web applications.
22
Firewall (Cont..)
Types of Firewalls:
AI-Powered Firewall
• An AI-powered firewall uses artificial intelligence to
enhance network security by analyzing traffic
patterns, detecting emerging threats, and adapting in
real time.
23
Firewall (Cont..)
Types of Firewalls:
AI-Powered Firewall
• It provides advanced threat detection, including zero-
day attacks, and reduces false positives by learning
from data.
24
Questions
Any Question Please?
25
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown
26
Thanks
27