Network Security Marshall Leitem 11/30/04

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
_IT Security and Intellectual Property Summer 2006 Bashar Al Takrouri Personal Firewalls “Case study ::ZoneAlarm Security Suite” Instructor: Prof. Dr.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Introduction to Firewalls © N. Ganesan, Ph.D.. Overview.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
“DMZ In a Box”. What is a DMZ? As a military term As a computing term.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Networking Components Assignment 3 Corbin Watkins.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Cryptography and Network Security
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Introduction to Firewalls
Firewall Techniques Matt Cupp.
Top 5 Open Source Firewall Software for Linux User
Why do we need Firewalls?
Firewall.
Computer Data Security & Privacy
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Introduction to Networking
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Network Security: IP Spoofing and Firewall
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
FIREWALL By Abhishar Baloni I.D
Firewalls Jiang Long Spring 2002.
Fire-wall.
Firewall.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
FIREWALL.
Firewall Installation
Presentation transcript:

Network Security Marshall Leitem 11/30/04 Firewalls Network Security Marshall Leitem 11/30/04

Overview What is a firewall? What does it protect us from? What does it consist of? Hardware/software Questions?

What is a Firewall? fire·wall Any of a number of security schemes that prevent unauthorized users from gaining access to a computer network or that monitor transfers of information to and from the network.

Securities Employed Packet Filtering Checks incoming packets to see they meet set requirements, if not the packets are discarded. Proxy Service Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. Stateful inspection - doesn't examine the contents of each packet, compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded

What does it consist of? Software Implementations Zone Alarm Omniquad Personal Firewall Norton Personal Firewall Hardware Implementations Linksys Etherfast Cable/DSL Firewall Router CISCO PIX 500 Firewall

Pictures

Basic Topology

Examples of Common Filters IP Address – has the ability to block specific IP’s or Domains or only permit specific ones. Domains – can block access to specific domains or only allow specific domains Protocols Ports Key Words

What it Prevents Remote Login Application Backdoors SMTP session Jacking Denial of Service Attacks Spam Source Routing

Demilitarized Zone You want the un-trusted or un-known networks to have access to some of your resources You still want to maintain a secure private network A Firewall is used to create this area

DMZ(demilitarized zone)

DMZ

Downside of Firewalls Performance Degradation Can be difficult to configure Can be susceptible to IP-Spoofing Can Interfere with some software Extra Costs

Benefits of Firewalls Provides a “choke point” in which traffic can be evaluated to see it meets specifications. Prevents Remote Login Allows rules on users and data traveling through to be imposed.

What can’t Firewalls Protect Against? (Steel door on a Wooden House) Attacks that don’t go through firewall Traitors Manually Moving of Data (tape storage, etc) Tunneling Trojans & Viruses

Cost Options? Free – software based firewalls can be found Exspensive up to $100,000+ hardware solutions that require much time and effort to install

Hardware Vs. Software Hardware in most cases, they can be effective with little or no configuration can protect every machine on a local network Can be susceptible to attacks from inside the private network due to trojans Often packet filtering is set up too trusting of outgoing packets Group wide Policy

Hardware Vs. Software Software you can specify which applications are allowed to communicate over the Internet from that PC (ex: only outlook express can use Port 25) can only protect the machine they're installed on Better protection against trojans and worms than hardware but must be configured on each machine

Questions?