Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Pacman: Firewall Edition

Similar presentations


Presentation on theme: "Digital Pacman: Firewall Edition"— Presentation transcript:

1 Digital Pacman: Firewall Edition
Group Members Julia Coco Adam Daunis Dakota Greene Greg Huete ISDS 4120 11/26/2012

2 Digital Pacman: Firewall Edition
Initiate startup… DONE Firewall definitions… IN PROGRESS Protection methods… IN PROGRESS Filtering Logic… IN PROGRESS Personal Firewalls… IN PROGRESS Network Zones… IN PROGRESS Remote Access… IN PROGRESS

3 Digital Pacman: Firewall Edition
Loading firewall definitions… IN PROGRESS Network Threats… IN PROGRESS Firewall self-actualization… IN PROGRESS Protection Methods Sequence… LOADING… DONE DONE DONE Firewall Options Does not have to be dedicated device Run in two locations Hide IP Addresses Using NAT Filter Traffic Based on MAC Addresses Hackers Natural Disasters Firewalls protect networks from external threats by filtering packets, using many different techniques 1. External Router usually acts as firewall AKA “Network-based” or “hardware” firewalls Selectively block TCP/UDP Ports 2. Internal Computer software AKA “Host-based” or “software” firewalls Anything that can potentially damage network data, machines, or users 1 Users with Good Intentions

4 DONE DONE DONE DONE Protection method: Hide IP… IN PROGRESS
Network Address Translation… IN PROGRESS Load NAT Notes… IN PROGRESS Load NAT Graphic… IN PROGRESS DONE DONE DONE DONE Most common firewall technique Hackers can probe exposed IP addresses for vulnerabilities Hiding IPs prevents these probes Network Address Translation (NAT) Translates system IP before sending via network Network using NAT assigns system private IP address Reduces Need for IANA public IP addresses Built into most routers Not originally designed as firewall Network IP Addresses NAT

5 Second most common firewall tool Less common tool used by Hackers
Protection method: Port Filtering… IN PROGRESS Selectively blocking TCP/UDP ports IN PROGRESS Load Port Filter Notes… IN PROGRESS Load Port Filter Graphics… IN PROGRESS DONE DONE DONE DONE Second most common firewall tool Less common tool used by Hackers Restricts packets based on port numbers Prevents the passage of any TCP or UDP segments Requires serious configuration “Which ports do I allow in?” Two Ways: Have the port filtering close all ports Leave all the ports open Dynamic port usage Routers can have both NAT and port filtering TCP Ports Dynamic Port Usage UDP Ports

6 DONE DONE DONE DONE Protection method: Filter Traffic
Based on MAC Addresses… IN PROGRESS Initiate MAC Filtering… IN PROGRESS Load MAC Filtering Notes… IN PROGRESS Load MAC Filtering Graphic… IN PROGRESS DONE DONE DONE DONE Guest Laptop Allow or deny access to the network according to the MAC address of the client Similar to packet filtering Usually used as a security measure for a wireless network Advantage: Easy to set up Disadvantages: Can be defeated through MAC spoofing It can be a little work to add a new MAC address every time someone new wants to use your Wi-Fi Wireless Network

7 Personal Firewalls > Single machines or small network > Default block incoming packets > Windows Firewall

8 Connections Dial Up High Speed > Difficult for hackers to detect
Connections are temporary DHCP assigned IP addresses > Just need antivirus system High Speed > Always connected > DHCP with long-lived IP addresses Attackers have time Antivirus and firewall recommended

9 Large Networks Web and Email
Require heavy protection Dedicated firewall boxes Filter traffic and provide innovative features Honeypot concept Exposed Demilitarized zone Hacker ! Threat detected Ban Intruder ? No useful information found

10 Securing Remote Access
Employees access network from home Cost effective Balancing act Security challenge Virtual Private Networks Vulnerability Scanners

11 Digital Pacman: Firewall Edition
Firewall definitions… IN PROGRESS Protection methods… IN PROGRESS Filtering Logic… IN PROGRESS Personal Firewalls… IN PROGRESS Network Zones… IN PROGRESS Remote Access… IN PROGRESS DONE DONE DONE DONE DONE DONE

12 Questions?


Download ppt "Digital Pacman: Firewall Edition"

Similar presentations


Ads by Google