0% found this document useful (0 votes)
155 views

Firewall

This document provides an overview of firewalls including what they are, the types of threats they protect against, and how they function. It defines a firewall as a system that prevents unauthorized access between private networks and the internet. It describes common firewall types like packet filtering and proxy firewalls. It also outlines what firewalls can and cannot do in terms of security capabilities and limitations.

Uploaded by

Jewel Dayanandan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
155 views

Firewall

This document provides an overview of firewalls including what they are, the types of threats they protect against, and how they function. It defines a firewall as a system that prevents unauthorized access between private networks and the internet. It describes common firewall types like packet filtering and proxy firewalls. It also outlines what firewalls can and cannot do in terms of security capabilities and limitations.

Uploaded by

Jewel Dayanandan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 36

WELCOME

into
ZONE OF FIREWALL
Content::
 INTODUCTION
 WHAT WE ARE TRYING TO
PROTECT ?
 WHAT ARE YOU TRYING TO
PROTECT AGAINST?
 WHAT IS AN INTERNET
FIREWALL?
 HOW IT PROVIDE SECURRITY?
 WHAT ARE THE TYPES OF
FIREWALLS?
 WHAT CAN A FIREWALL DO?
 WHAT CAN’T A FIRE WALL DO?
 FIREWALL ARCHITECTURES
 FIREWALL DESIGN

 BIBLIOGROPHY
INTRODUCTION
 In a building construct , a firewall is
designed to keep a fire from spreading
one part of the building to another.
A Internet firewall serves a
similar purpose : it prevents the danger of
Internet from spreading to your Internal
network
DEFINITION
WHAT IS A FIREWALL
EXACTLY?

 A Firewall is simply a system designed


to prevent unauthorized access to or
from a private networks.
Firewalls can be implemented in both
hardware and software, or the combination
of both.
WHAT ARE YOU TRYING TO
PROTECT?
WHAT ARE YOU TRYING TO
PROTECT?

 YOUR DATA: the information you keep on

the computers.

 YOUR RESOURCES: the computer themselves.

 YOUR REPUTATION.
WHAT ARE WE TRYING TO
PROTECT AGAINST?

 All the thing which we have is to be


protected against attacks.
Attacks are mainly categorized as:
1. Intrusion.
2. Denial of service ( DOS).
3. Information Theft.
WHY IT IS REQUIRED?

A Firewall serves multiple purposes:


 It restricts people to entering at a carefully
controlled point.
 It prevents attackers from getting close to
your other defenses.
 It restricts people to leaving at a carefully
controlled point.
WHAT CAN A FIREWALL
DO?
Firewall can do a lot of for your site’s
security.In fact,some advantages of using
firewalls are :
 A firewall is a focus for security decisions.
 A firewall can enforce a security policy.
 A firewall provide segmentation and
isolation.
 A firewall limits your exposure.
WHAT CAN,T A
FIREWALL DO?
Firewalls offer excellent protection against network threats ,but
they are not a complete security solution

 Firewall can’t protect you against malicious Insiders


 Detecting a virus in a random packet of data passing
through a firewall.
 A firewall can’t protect you against connections that don’t
go through it.
 A firewall can’t set itself up correctly.
 A firewall can’t protect against completely new threats.
TYPES OF FIREWALLS?

There are three kinds of firewalls.


You can think of them as being lik
the ways you can screen phone
calls.
 Packet filter firewalls.
 Proxy firewalls.
 Personal software firewalls.
WHAT IS A PACKET FILTER
FIREWALL?
 Proxies are like a secretary in an office
The secretary takes the call, finds out
who is calling and why, and decides
what to do. Based on the caller’s
identity and reasons, they might
transfer the call to the appropriate
person, take a message (which would
be like logging the call), or choose to
ignore the call (if it was a wrong
number, or a caller from a competitor.
FIREWALL
ARCHITECTURES

Firewall architectures are categorized as:

* Single-Box Architectures.
*Screening Router.
*Dual-Homed Host.

*Screened Host Architectures.


Example of packet filtering fw
LIMITATIONS OF
FIREWASLLS

.
BIBLIOGRAPHY
* Building Internet Firewalls
 
Zwiecky,Cooper&Chapman
 
* Data
  Communication And Networking
Behrouz A. Forouzan
* Internet Security Protocols
Uyless Black
* WWW.FIREWALL.CX
* WWW.OREILLY.COM
* Building Internet Firewalls
Zwiecky,Cooper&Chapman
* Data Communication And Networking
Behrouz A. Forouzan
* Internet Security Protocols
Uyless Black
* WWW.FIREWALL.CX
* WWW.OREILLY.COM
* WWW.VULCAN.EE.ISTATE.EDU
FIREWALL DESIGN

When you design a firewall, you go through


the basic outline as:

 Define your needs.


 Evaluate the available products.
 Figure out , How to assemble the products
in to working firewall?
DEFINE YOUR NEED

What will Actually do for you?

 Decide service need to offer?


 Decide security.
 Decide usage.
 Decide reliability
WHAT ARE YOUR
CONSTRAINTS?

 Your budget.

 Personal availability.

 Environment.
Environment
EVALUATE THE
AVAILABLE PRODUCTS

 Scalability
 Reliability and Redundancy.
 Price.
 Management and Configuration.
PUT EVERYTHING
TOGETHER

 Where will logs go, and how?


 How will you back up the system?
 What support services does the
system require?
 How will you access the machines?
 Where will routine reports go,and
how?
Business Concept

 Summarize key technology, concept or


strategy on which your business is based
Competition

 Summarize competition
 Outline your company’s competitive
advantage
Goals & Objectives

 Five-year goals
– State specific measurable objectives
– State market share objectives
– State revenue/profitability objectives
Financial Plan

 High-level financial plan that defines


financial model, pricing assumptions, and
reviews yearly expected sales and profits
for the next three years.
 Use several slides to cover this material
appropriately.
Resource Requirements

 Technology requirements
 Personnel requirements
 Resource requirements
– Financial, distribution, promotion, etc.
 External requirements
– Products/services/technology required to be
purchased outside company
Risks & Rewards

 Risks
– Summarize risks of proposed project
 Addressing risk
– Summarize how risks will be addressed
 Rewards
– Estimate expected pay-off, particularly if
seeking funding
Key Issues
 Near term
– Isolate key decisions and issues that need
immediate or near-term resolution
 Long term
– Isolate issues needing long-term resolution
– State consequences of decision postponement
 If you are seeking funding, state specifics

You might also like