Firewall: by Aztecs

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

FIREWALL

BY AZTECS
TABLE OF CONTENTS

 WHAT IS FIREWALL?
 TYPES OF FIREWALL
 HOW DOES IT WORK?
 WHAT FIREWALL CAN’T PREVENT?
 IMPORTANCE OF FIREWALL
 EXAMPLES OF BEST KNOWN FIREWALL.
WHAT IS FIREWALL?

 A FIREWALL IS A SYSTEM DESIGNED TO PREVENT


UNAUTHORISED ACCESS TO OR FROM A PRIVATE NETWORK.
 IT PERMITS ONLY LEGITIMATE COMMUNICATIONS TO PASS.
 FIREWALLS ARE COMPUTER SECURITY SYSTEMS THAT
PROTECT YOUR OFFICE/HOME PCS OR YOUR NETWORK FROM
INTRUDERS, HACKERS & MALICIOUS CODE.
AN EXAMPLE OF USER INTERFACE FOR A
FIREWALL
TYPES OF FIREWALL

 NETWORK LAYER AND PACKET FILTERS:


* NETWORK LAYER FIREWALLS ARE ALSO CALLED PACKET FILTERS,. IF
A PACKET DOES NOT MATCH AN EXISTING CONNECTION, IT WILL BE
EVALUATED ACCORDING TO THE RULES SET FOR NEW CONNECTIONS.
IF A PACKET MATCHES AN EXISTING CONNECTION BASED ON
COMPARISON WITH THE FIREWALL'S STATE TABLE, IT WILL BE
ALLOWED TO PASS WITHOUT FURTHER PROCESSING.
 APPLICATION-LAYER:
* IN PRINCIPLE, APPLICATION-LAYER FIREWALLS CAN PREVENT ALL
UNWANTED OUTSIDE TRAFFIC FROM REACHING PROTECTED
MACHINES.ON INSPECTING ALL PACKETS FOR IMPROPER CONTENT,
FIREWALLS CAN RESTRICT OR PREVENT OUTRIGHT THE SPREAD OF
NETWORKED COMPUTER WORMS AND TROJANS. THE ADDITIONAL
INSPECTION CRITERIA CAN ADD EXTRA LATENCY TO THE
FORWARDING OF PACKETS TO THEIR DESTINATION.
AN ILLUSTRATION OF WHERE A FIREWALL
WOULD BE LOCATED IN A NETWORK.
OTHER TYPES OF FIREWALL

 PROXY SERVER:
* INTERCEPTS ALL MESSAGES ENTERING AND LEAVING THE NETWORK.
THE PROXY SERVER EFFECTIVELY HIDES THE TRUE NETWORK
ADDRESS.
 NETWORK ADDRESS TRANSLATION:
* IN COMPUTER NETWORKING, NETWORK ADDRESS TRANSLATION
(NAT) IS THE PROCESS OF MODIFYING IP ADDRESS INFORMATION IN
IP PACKET HEADERS WHILE IN TRANSIT ACROSS A TRAFFIC
ROUTING DEVICE.FIREWALLS OFTEN HAVE SUCH FUNCTIONALITY TO
HIDE THE TRUE ADDRESS OF PROTECTED HOSTS.
HOW DOES IT WORK?

 FIREWALLS ARE SETUP AT EVERY CONNECTION TO THE INTERNET,


THEREFORE SUBJECTING ALL DATA FLOW TO CAREFUL MONITORING.
FIREWALLS CAN ALSO BE TUNED TO FOLLOW "RULES". THESE RULES
ARE SIMPLY SECURITY RULES THAT CAN BE SET UP BY YOURSELF OR
BY THE NETWORK ADMINISTRATORS TO ALLOW TRAFFIC TO THEIR
WEB SERVERS, FTP SERVERS, TELNET SERVERS, THEREBY GIVING THE
COMPUTER OWNERS/ADMINISTRATORS IMMENSE CONTROL OVER THE
TRAFFIC THAT FLOWS IN & OUT OF THEIR SYSTEMS OR NETWORKS.
 RULES WILL DECIDE WHO CAN CONNECT TO THE INTERNET, WHAT
KIND OF CONNECTIONS CAN BE MADE, WHICH OR WHAT KIND OF FILES
CAN BE TRANSMITTED IN OUT. BASICALLY ALL TRAFFIC IN & OUT CAN
BE WATCHED AND CONTROLLED THUS GIVING THE FIREWALL
INSTALLER A HIGH LEVEL OF SECURITY & PROTECTION.
WHAT FIREWALL CAN’T PREVENT?

E‑MAIL VIRUSES :
* E‑MAIL VIRUSES ARE ATTACHED TO E‑MAIL MESSAGES. A FIREWALL
CAN'T DETERMINE THE CONTENTS OF E‑MAIL MESSAGES, SO IT CAN'T
PROTECT YOU FROM THESE TYPES OF VIRUSES. YOU SHOULD USE AN
ANTIVIRUS PROGRAM TO SCAN AND DELETE SUSPICIOUS
ATTACHMENTS FROM AN E‑MAIL MESSAGE BEFORE YOU OPEN IT.
EVEN WHEN YOU HAVE AN ANTIVIRUS PROGRAM, YOU SHOULD NOT
OPEN AN E‑MAIL ATTACHMENT IF YOU'RE NOT POSITIVE IT'S SAFE.
PHISHING SCAMS:
* PHISHING IS A TECHNIQUE USED TO TRICK COMPUTER USERS INTO
REVEALING PERSONAL OR FINANCIAL INFORMATION, SUCH AS A
BANK ACCOUNT PASSWORD. A COMMON ONLINE PHISHING SCAM
STARTS WITH AN E‑MAIL MESSAGE THAT APPEARS TO COME FROM A
TRUSTED SOURCE, BUT ACTUALLY DIRECTS RECIPIENTS TO PROVIDE
INFORMATION TO A FRAUDULENT WEBSITE. FIREWALLS CAN'T
DETERMINE THE CONTENTS OF E‑MAIL MESSAGES, SO THEY CAN'T
PROTECT YOU FROM THIS TYPE OF ATTACK.
WHAT FIREWALL CAN’T DO?
 A FIREWALL CANNOT STOP OR REMOVE MALWARE THAT IS ALREADY
ON YOUR COMPUTER OR NETWORK. IT ALSO CANNOT DEAL WITH
SECURITY THREATS THAT ARE OUTSIDE OF THE REALM OF SOFTWARE,
SUCH AS POOR PASSWORD PROTECTION.
IMPORTANCE OF FIREWALL

 IF YOU DO A FRESH INSTALL OF WINDOWS XP, AND LEAVE IT


UNPATCHED, YOUR COMPUTER WILL BE ATTACKED WITHIN MINUTES.
YOU'LL BE ATTACKED THROUGH YOUR OPEN PORTS, AND BOMBARDED
WITH POPUP MESSAGES; TROJANS, VIRUSES AND WORMS WILL BE
LOADED .SPYWARE AND MALWARE WILL CLOG UP YOUR BROWSER
 BY HAVING A GOOD FIREWALL YOU ELIMINATE SOME RISKS WITH A
COMPUTER ON THE INTERNET AND HOPEFULLY KEEP OUT THE
MALICIOUS PEOPLE. FIREWALLS CONSTANTLY HAVE TO BE TWEAKED
OR FINE-TUNED TO KEEP OUT THE LATEST TRICKS AND TRAPS SET BY
THE HACKERS
EXAMPLES OF BEST KNOWN FIREWALL :
 MCAFEE INTERNET SECURITY
 MICROSOFT WINDOWS FIREWALL
 NORTON PERSONAL FIREWALL
 TREND MICRO PC-CILLIN
 ZONEALARM SECURITY SUIT
THANK YOU………….

You might also like