Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
_IT Security and Intellectual Property Summer 2006 Bashar Al Takrouri Personal Firewalls “Case study ::ZoneAlarm Security Suite” Instructor: Prof. Dr.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
Firewalls and Intrusion Detection Systems
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
The Internet and Security Steven Shedd. The Internet How it began How it began.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Guide to Computer Network Security
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls: General Principles & Configuration (in Linux)
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall Security.
Module 11: Designing Security for Network Perimeters.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Network Security Marshall Leitem 11/30/04
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Security in Networking
Guide to Computer Network Security
Firewalls Purpose of a Firewall Characteristic of a firewall
FIREWALL By Abhishar Baloni I.D
Firewalls Jiang Long Spring 2002.
Lecture 3: Secure Network Architecture
Firewalls Chapter 8.
Implementing Firewalls
Presentation transcript:

Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates

Fundamentals of Firewalls What is a firewall? – A firewall is a software or hardware that prevents unauthorized access, and enforces an access control party between two networks. – A firewall imposes its policy on everything behind it. – YOU – the user decides the policy

Why do we need a firewall? To prevent certain types of data from getting in or out of particular areas Security between the outside world and your network, especially protection from most Internet security threats Firewalls keep damage on one part of the network

What does a firewall protect against? Security threats posed by the Internet Unauthenticated interactive logins Application backdoors SMTP session hijacking Operating system bugs Denial of service bombs Macros Viruses Spam Redirect bombs Source routing

What does a firewall not protect against? Certain class of threats such as inside attacks, and Outside attacks that it cannot detect Tunneling over most application protocols to trojaned or poorly written clients Data-driven attacks- something is mailed or copied to an internal host where it is then executed. – Past occurrences against OutLook

OSI MODEL & FIREWALLS Packet Filter Firewalls Work at network layer Usually routers and firewall appliances Scan IP header in rule base for: – Source IP address – Destination IP address – TCP/UDP source port – TCP/UDP destination port Example on web

Circuit Level Gateways Work in session layer of the OSI model (~ transport layer of the TCP/IP model) Ensures that the session between two end users is legitimate However, no further processing or filtering of individual packets is done.

Application Level Gateways Work in application layer Usually proxy servers, also personal firewalls High level of security Can slow down network Example: Proxy Server and DMZ

Stateful Multilayer Inspection Firewalls Combination of the above High level of security, and good performance Expensive Complex

TYPES OF FIREWALLS Personal Firewalls Software-only solutions No external devices – Easy to install and upgrade Protects against: – Worms, Trojan horses, and spyware Examples: ZoneAlarm, BlackIce Advantages, Disadvantages

Firewall Appliances Specialized hardware devices, sometimes part of SOHO router Can be Plug and Play Provide NAT and TCP port inspection DMZ Example: NetGear, Linksys etc.

Turnkey Solutions Turnkey solutions combine (arguably) the best of both Appliance and Software-only solutions Wider range of services offered More expensive, greater number of components

Differences between software and hardware firewalls On webpage: Level of Protection Manageability Cost Analysis Feature Set Comparison Future Outlook Grade Summary

REMEMBER The use of firewalls presents a tradeoff between service and protection. Decide what your optimal balance between security and service is!!!

Conclusion Implementing a firewall is a great tool for security purposes BUT, DO EXPECT FAILURE PLAN FOR THE WORST

Q & A Questions?