Professional Documents
Culture Documents
Firewall
Firewall
for security
Prepared by
Apoorva Mahajan
&
Jyoti Chugh
Types of outsiders attack
Intrusion
(data compromise like
loss of confidentiality ,
integrity)
Information theft
●
Concentrated Security
●
Enhanced Privacy
Hardware vs. Software Firewalls
•Hardware Firewalls
• Protect an entire network
• Implemented on the router level
• Usually more expensive, harder to configure
•Software Firewalls
• Protect a single computer
• Usually less expensive, easier to configure
Firewalls use 3 types of filtering
mechanisms:
Firewalls are a must have for any kind of computer usage that go online.
They protect you from all kinds of abuse & unauthorised access like trojans
that allow taking control of your computers by remote logins or backdoors,
virus or use your resources to launch DOS attacks.
Some of the firewall products that you may want to check out are:
McAfee Internet Security
Microsoft Windows Firewall
Norton Personal Firewall
Trend Micro PC-cillin
ZoneAlarm Security Suit
PKI
Public key infrastructure
Public Key Infrastructure (PKI) is the accepted, global standard for Internet
security. It is a system that uses asymmetric encryption and digital
certificates to achieve secure Internet services
A Public Key Infrastructure generally consists of four parts.