Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.

Similar presentations


Presentation on theme: "By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary."— Presentation transcript:

1 By: Keith Reiter COSC 356

2 Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary

3 Introduction What is a firewall? Filters Malicious packets Gateway between two networks usually a trusted network and untrusted networks Software and hardware based

4 Software Window’s firewall Norton McAfee Bit Defender

5 Norton

6 Norton Continued

7

8

9

10

11

12 Top Free Software Firewalls Zone Alarm Free Firewall PC Tools Firewall Plus Online Armor Free

13 Pros and Cons of Software Firewalls Cheaper Takes less room More Vulnerable to malicious attacks / lower performance Dependent upon the host operating system

14 Hardware based firewalls Hardware device placed somewhere in the traffic flow of a network Receives and analyzes packets traveling into and out of a network Checks access rules

15 Pros and Cons of hardware based firewalls Operating system independent Less vulnerable to malicious attacks / better performance Can be the single point of failure Higher administrative overhead More expensive to implement and maintain

16 Important Firewall Access Rules The network administrator should be able to communicate directly with the firewall. The firewall should not be able to communicate directly with any other device. No other device should be able to communicate directly with the firewall. Other network traffic should be routed directly to the appropriate servers. All outbound communications should be allowed - unless corporate policy says otherwise. The last rule should deny entry to any packet that does not match any other rule.

17 Firewall Logging Activate logging on the firewall and review the summary of recent events Generate reports from the raw data Analyze the report and identify any potential issues Modify the firewall's access rules to deal with potential issues After any changes have been made, review the log files again to ensure that the changes achieved the desired results

18 Who needs a firewall? Anyone that connects to a network At home on your personal computer Businesses

19 At home Usually software based Need to protect personal information such as banking information

20 Businesses Hardware based would be better Employee information Business information and products

21 Tom Rowan “As more business exposes their corporate data – and that of their customers – to the internet, the firewall technology that protects them has had to evolve.”

22 Ali Pabari You need to deploy a firewall at more than just the perimeter. You need different layers of firewalls “The implementation of these layers of security technology will make it highly unlikely that unauthorized individuals will gain access to vital systems.”

23 Vince Tuesday Wrote “Good Firewalls Make Good Neighbors” “The simplest way to keep malicious code from spreading between our networks is to deploy firewalls and configure them so they limit traffic to what’s needed and block everything else.”

24 Matthew French Military needs a secure firewall “By deploying firewall technology embedded on personal computer network cards, participants in the war fighting exercise enforced security policies across disparate severs”

25 Summary Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall

26 Short video http://www.youtube.com/watch?v=wQIA_KTPDeI

27 QUESTIONS?

28 References http://www.youtube.com/watch?v=wQIA_KTPDeI http://decipherinfosys.com/Firewall.pdf Ali Pabari, Uday D. “Business Defense.” Certification magazine 6.4 (2004): 40-43. Computers & Applied Sciences complete. Web. 9 Apr. 2012. French, Matthew. “Navy Test Plug-In Security.” Federal Computer Week 17.20 (2003):56. Computers & Applied Sciences Complete. Web. 11 Apr. 2012. Rowan, Tom. “Application Firewalls: Filling The Void.” Network Security 2007.4 (2007): 4-7. Computers & Applied Science Complete. Web. 7 Apr. 2012. Tuesday, Vince. “Good Firewalls Make Good Neighbors.” Computerworld 37.50(2003):34. Computer & Applied Sciences Complete. Web. 10 Apr. 2012


Download ppt "By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary."

Similar presentations


Ads by Google