Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Presented by Serge Kpan LTEC Network Systems Administration 1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Chapter 13 – Network Security
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Internet and Intranet Fundamentals Class 8 Session A.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Top 5 Open Source Firewall Software for Linux User
What is a Firewall?.
Instructor Materials Chapter 7 Network Security
Network Security Marshall Leitem 11/30/04
Introduction to Networking
Firewalls.
Security in Networking
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd   Tel: or  Skype: sophan.nhean  Facebook:

What Firewall can do to protect your Network? 2 Prepared by: Mr. NHEAN Sophan

Agenda 3  What is a firewall?  What does a firewall do?  What can’t a firewall do?  Who need a firewall?  How does a firewall work?  What are the protection methods of firewall?  How do we implement a firewall?  Conclusion – Benefits of firewall  Scenario  Questions and Answers Prepared by: Mr. NHEAN Sophan

What is a firewall? 4  Firewall is a component or set of computer that restrict access between a protected network and the Internet or between a sets of networks.  Protects networked computers from intentional hostile intrusion from outside.  Places a bottleneck (or Choke Point) between the networks  All communications must pass through the bottleneck – this gives us a single point of control Prepared by: Mr. NHEAN Sophan

What is a firewall? 5  There are two types of firewall Prepared by: Mr. NHEAN Sophan  Hardware firewall device Fortinet Juniper CISCO ASA  Software firewall program IP Chains & IPTables IPCop SELinux ISA

What can a firewall do? 6  A firewall examines all traffic routed between two networks to see if it meets certain criteria (allowed if it does, otherwise it dropped)  Focus on security decision (Choke point)  Enforce security policy  Log Internet Activities efficiently Prepared by: Mr. NHEAN Sophan

What can a firewall do? 7  It filters traffic base on:  Source and Destination IP address  Source and Destination Port number  Protocols used  It protect your computer and personal information from:  Hackers break into your system  Can prevent some kind of virus Prepared by: Mr. NHEAN Sophan

What can't a firewall do? 8 A firewall can’t protect you against:  Phishing scam, spyware or viruses spread through .  Malicious insider: people who gain physical access to your computer or network  For an unprotected wireless network  After network has been compromised  Connections that don’t go through firewall (Modem users)  Completely new threats Prepared by: Mr. NHEAN Sophan

Who need a firewall? 9  Anyone who is responsible for a private network that is connected to a public network.  Big, Medium, and Small Enterprise  Anyone who connect from single computer to internet via modem, etc. Prepared by: Mr. NHEAN Sophan

How does firewall work? 10  A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria. Prepared by: Mr. NHEAN Sophan Outbound Inbound Basic Firewall Operation

What are the protection methods of firewall? 11  Packet Filtering  Rejects TCP/IP packets from unauthorized hosts and/or connection attempts but unauthorized hosts  Network Address Translation (NAT)  Translates the addresses of internal hosts so as to hide them from the outside world  Also known as IP masquerading  Proxy Services  Makes high level application level connections to external hosts on behalf of internal hosts to completely break the network connection between internal and external hosts Prepared by: Mr. NHEAN Sophan

How do we implement the firewall? 12  Determine the access denial methodology to use  Determine Inbound access policy  Determine Outbound access policy  Decide whether to buy a complete firewall product, have one implemented by a systems integrator or implement one yourself. Prepared by: Mr. NHEAN Sophan

Benefits of firewall 13  Protects private Local Area Network form hostile intrusion from internet  Block harmful packet to reach important resources  Allows network administrators to offer access to specific types of Internet services to selected LAN users  It can protect:  Your Data: the information you keep on computers  Your resource: the computers themselves  Your reputation: Intruders on the Internet appear with your identity. Prepared by: Mr. NHEAN Sophan

Challenging question 14 Prepared by: Mr. NHEAN Sophan Is a firewall sufficient to secure my network or do I need anything else?

Scenario 15 Firewall Scenario Prepared by: Mr. NHEAN Sophan

Scenario 1: Saturday, Midnight 16 Prepared by: Mr. NHEAN Sophan

5 Minutes later 17 Prepared by: Mr. NHEAN Sophan

Scenario 2: Monday, Midnight 18 Prepared by: Mr. NHEAN Sophan Black Hacker OK, let’s try the Insurance company…. This should take about 5 minutes!

1 minutes later 19 Prepared by: Mr. NHEAN Sophan Information Security Manager Insurance Company

5 Hours later 20 Prepared by: Mr. NHEAN Sophan Black Hacker

21 Prepared by: Mr. NHEAN Sophan Source by Building Internet Firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman