Professional Documents
Culture Documents
Comp Sec Presentation1
Comp Sec Presentation1
Comp Sec Presentation1
3
FIREWALL AND ITS PRIMARY
PURPOSE
A firewall is a system that provides network security by filtering
incoming and outgoing network traffic based on a set of user-defined
rules.
Firewalls is prevents unauthorized users, devices, and applications
from entering a protected network environment or segment.
How Does a Firewall Work?
Firewalls work by inspecting packets of data and checking them for
threats to enhance network security.
4
HARDWARE AND SOFTWARE
FIREWALLS
5
Types of Firewalls
Some of the main types that depending on how they function and
their deployment models are Packet filtering firewall, Stateful
inspection firewall, Circuit-level gateway and Application-level
gateway.
6
THE STRENGTHS AND WEAKNESSES OF
FIREWALL
Firewall has several strengths, such as enforcing security policies,
restricting access to services, providing security without
compromising usability, monitoring network activity, and alerting
about events.
However, it also has some weaknesses, such as being vulnerable to
internal attacks, being unable to block traffic that does not pass
through it, being dependent on the quality of security policies and
administration, and being unable to protect against malicious content
that is allowed by the rules.
7
THE APPLICATION OF DIFFERENT
FIREWALL TYPES
The different types of firewalls that can be used to protect networks, devices,
and web applications from various threats.
The main types of firewalls are:
Network firewalls: They monitor and control the network traffic based on
predefined rules. They can be static, stateful, or next-generation, depending on
the level of sophistication and analysis they perform.
Host-based firewalls: They monitor and control the traffic from a specific
device, regardless of the network it is connected to.
Web application firewalls: They protect web applications from web-based
attacks by inspecting and filtering the requests and responses.
8
FIREWALL CONFIGURATION AND
RULES
It describes the different types of firewall rules, such as packet-
filtering, stateful inspection, and proxy filters, and how they affect the
traffic flow.
It also lists some best practices for creating and maintaining firewall
rules, such as documenting, monitoring, grouping, and reviewing
them.
• Rule Complexity:
Challenge: Managing a large number of complex rules can lead to oversight
and misconfigurations.
Solution: Regularly review and optimize rules, implementing a structured
naming convention and documentation for better clarity.
User Authentication:
Challenge: Ensuring that only authorized users access specific resources.
Solution: Integrate firewall rules with user authentication systems such as
LDAP or Active Directory for user-specific access controls
10
MAINTAINING AN EFFECTIVE FIREWALL
STRATEGY OVER TIME
To keep a firewall strategy effective, it is important to:
Audit firewall rules and policies regularly to find and fix any issues.
Update firewall rules and policies to cope with new threats.
Log and monitor network activity to detect and respond to suspicious
behavior.
Train IT staff and end-users on firewall security, best practices, and
potential threats.
11