1 / 9

History of Firewalls

History of Firewalls. By: Colby Shifflett Dr. Grossman Computer Science 420 12/01/2009. The Need for Firewalls. Before the use of firewalls, networks were extremely vulnerable to intrusions and data leaking. Extremely weak security No virus security

lyris
Download Presentation

History of Firewalls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. History of Firewalls By: Colby Shifflett Dr. Grossman Computer Science 420 12/01/2009

  2. The Need for Firewalls • Before the use of firewalls, networks were extremely vulnerable to intrusions and data leaking. • Extremely weak security • No virus security • The first firewall was introduced in 1985 by the IOS software division - Cisco • The first published papers on firewalls was not until 3 years after its first deployment by Digital Equipment Company

  3. What is a firewall? • A firewall is a system or set of systems that are used to control access • Designed to block all unauthorized communication and accept all authorized. • According to Cheswick and Bellovin, AT&T Bell Labs firewall engineers, a firewall should be used as a network chokepoint. (Late 1980’s)

  4. First Generation Firewalls • First Generation Firewalls are also known as packet filtering firewalls • Packet filtering routers were key in making the first firewalls • Very simple filtering device • Have a set of rules for the firewall • Ip, port, or protocol based • Based on set of rules, accept or reject communication request • Uses packet header

  5. First Generation Firewalls continued… • Network packet filtering offered more security than ever before for networks • Was very straight forward to understand, implement, and manage • Greatly helped popularity in commerce business • Evolved extremely quickly after first working model demonstrated its capabilities

  6. Second Generation Firewalls • Second Generation Firewalls are also known as Circuit Level Firewalls • Validates connections prior to allowing data exchange • After validation, a session is open and only data from source is permitted access • Every exchange of information is validated and monitored • Source/Destination Ip or port, time of day, user, password, or protocol are validation methods • No data is accepted unless a session is open

  7. Third Generation of Firewalls • Third Generation Firewalls are also known as Application Layer Firewalls or Proxy Firewalls • Operate at the 7th or Application layer of the OSI model • Monitors the protocol that is being used • Have the ability to run as a piece of software or a standalone device • Software firewalls are still very commonly used today • McAfee • Norton • DEC’s first release was named SEAL and grew quickly in popularity

  8. Fourth Generation Firewalls • Fourth Generation Firewalls are also known as stateful firewalls • Most important upgrade from First Generation Firewalls is the ability to keep track of the TCP connection state • Greatly prevents hackers access • Firewalls are able to determine if packets are a part of a new connection or existing connection • Relies on a three way handshake with TCP

  9. Any Questions? Thanks for listening!

More Related