Digital Pacman: Firewall Edition

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
IUT– Network Security Course 1 Network Security Firewalls.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Internet Protocol Security (IPSec)
Guide to Computer Network Security
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Windows 7 Firewall.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
Port Scanning James Tate II
Firewall Techniques Matt Cupp.
CONNECTING TO THE INTERNET
Why do we need Firewalls?
Computer Data Security & Privacy
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Hiding Network Computers Gateways
Security in Networking
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Network Security: IP Spoofing and Firewall
Guide to Computer Network Security
* Essential Network Security Book Slides.
Security+ Guide to Network Security Fundamentals, Third Edition
Firewalls Purpose of a Firewall Characteristic of a firewall
Network hardening Chapter 14.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
(DNS – Domain Name System)
Presentation transcript:

Digital Pacman: Firewall Edition Group Members Julia Coco Adam Daunis Dakota Greene Greg Huete ISDS 4120 11/26/2012

Digital Pacman: Firewall Edition Initiate startup… DONE Firewall definitions… IN PROGRESS Protection methods… IN PROGRESS Filtering Logic… IN PROGRESS Personal Firewalls… IN PROGRESS Network Zones… IN PROGRESS Remote Access… IN PROGRESS

Digital Pacman: Firewall Edition Loading firewall definitions… IN PROGRESS Network Threats… IN PROGRESS Firewall self-actualization… IN PROGRESS Protection Methods Sequence… LOADING… DONE DONE DONE Firewall Options Does not have to be dedicated device Run in two locations Hide IP Addresses Using NAT Filter Traffic Based on MAC Addresses Hackers Natural Disasters Firewalls protect networks from external threats by filtering packets, using many different techniques 1. External Router usually acts as firewall AKA “Network-based” or “hardware” firewalls Selectively block TCP/UDP Ports 2. Internal Computer software AKA “Host-based” or “software” firewalls Anything that can potentially damage network data, machines, or users 1 Users with Good Intentions

DONE DONE DONE DONE Protection method: Hide IP… IN PROGRESS Network Address Translation… IN PROGRESS Load NAT Notes… IN PROGRESS Load NAT Graphic… IN PROGRESS DONE DONE DONE DONE Most common firewall technique Hackers can probe exposed IP addresses for vulnerabilities Hiding IPs prevents these probes Network Address Translation (NAT) Translates system IP before sending via network Network using NAT assigns system private IP address Reduces Need for IANA public IP addresses Built into most routers Not originally designed as firewall Network IP Addresses NAT

Second most common firewall tool Less common tool used by Hackers Protection method: Port Filtering… IN PROGRESS Selectively blocking TCP/UDP ports IN PROGRESS Load Port Filter Notes… IN PROGRESS Load Port Filter Graphics… IN PROGRESS DONE DONE DONE DONE Second most common firewall tool Less common tool used by Hackers Restricts packets based on port numbers Prevents the passage of any TCP or UDP segments Requires serious configuration “Which ports do I allow in?” Two Ways: Have the port filtering close all ports Leave all the ports open Dynamic port usage Routers can have both NAT and port filtering TCP Ports Dynamic Port Usage UDP Ports

DONE DONE DONE DONE Protection method: Filter Traffic Based on MAC Addresses… IN PROGRESS Initiate MAC Filtering… IN PROGRESS Load MAC Filtering Notes… IN PROGRESS Load MAC Filtering Graphic… IN PROGRESS DONE DONE DONE DONE Guest Laptop Allow or deny access to the network according to the MAC address of the client Similar to packet filtering Usually used as a security measure for a wireless network Advantage: Easy to set up Disadvantages: Can be defeated through MAC spoofing It can be a little work to add a new MAC address every time someone new wants to use your Wi-Fi Wireless Network

Personal Firewalls > Single machines or small network > Default block incoming packets > Windows Firewall

Connections Dial Up High Speed > Difficult for hackers to detect Connections are temporary DHCP assigned IP addresses > Just need antivirus system High Speed > Always connected > DHCP with long-lived IP addresses Attackers have time Antivirus and firewall recommended

Large Networks Web and Email Require heavy protection Dedicated firewall boxes Filter traffic and provide innovative features Honeypot concept Exposed Demilitarized zone Hacker ! Threat detected Ban Intruder ? No useful information found

Securing Remote Access Employees access network from home Cost effective Balancing act Security challenge Virtual Private Networks Vulnerability Scanners

Digital Pacman: Firewall Edition Firewall definitions… IN PROGRESS Protection methods… IN PROGRESS Filtering Logic… IN PROGRESS Personal Firewalls… IN PROGRESS Network Zones… IN PROGRESS Remote Access… IN PROGRESS DONE DONE DONE DONE DONE DONE

Questions?