1 / 18

Understanding and Installing Firewalls

Understanding and Installing Firewalls. By: Daniel Justice Solo- Hedd Williams Chris Ross. History of Firewalls. Early History. Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity .

selene
Download Presentation

Understanding and Installing Firewalls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding and Installing Firewalls By: Daniel Justice Solo-Hedd Williams Chris Ross

  2. History of Firewalls

  3. Early History Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s to separate networks from one another.

  4. History The view of the Internet as a relatively small community of compatible users who valued openness for sharing and collaboration was ended by a number of major internet security breaches which occurred in the late 1980s: Clifford Stoll's discovery of German spies tampering with his system. Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic jail to observe an attacker. In 1988, an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues [2] that read, "We are currently under attack from an Internet VIRUS! It has hit Berkeley, UC San Diego, Lawrence Livermore, Stanford, and NASA Ames." The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one.

  5. First Generation: Packet Filters Engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. This fairly basic system was the first generation of what became a highly evolved and technical internet security feature. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin were continuing their research in packet filtering and developed a working model for their own company based upon their original first generation architecture.

  6. Second Generation: Application Layer filtering Gene Spafford of Purdue University, Bill Cheswick at AT&T Laboratories, and Marcus Ranum described a third generation firewall known as an application layer firewall. Marcus Ranum's work on the technology spearheaded the creation of the first commercial product. The product was released by DEC who named it the DEC SEAL product. DEC’s first major sale was on June 13, 1991 to a chemical company based on the East Coast of the USA. The key benefit of application layer filtering is that it can "understand" certain applications and protocols (such as File Transfer Protocol, DNS, or web browsing), and it can detect if an unwanted protocol is sneaking through on a non-standard port or if a protocol is being abused in any harmful way.

  7. Third Generation: “Stateful” Filters From 1989-1990 three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma, and Kshitij Nigam, developed the third generation of firewalls, calling them circuit level firewalls. Third-generation firewalls, in addition to what first- and second-generation look for, regard placement of each individual packet within the packet series. This technology is generally referred to as a stateful packet inspection as it maintains records of all connections passing through the firewall and is able to determine whether a packet is the start of a new connection, a part of an existing connection, or is an invalid packet.

  8. Great Firewall of China

  9. Installing Firewalls

  10. Best Firewalls of 2010 • Zone Alarm • Anti-virus scanner • Robust, powerful firewall with great features • Allows to assign different security levels • Prevent intrusions • F-Secure Internet Security 2010 • Protects your computer from viruses, worms, spyware • Detects and removes security threats • Supports Windows XP and Vista

  11. Best Firewalls of 2010 • NeT Firewall 2009 • Monitors activity • Pre-loaded security settings • Easy to install • Light on machine • Prisma Firewall • POP3, IMAP and SMTP traffic are scanned for viruses • Search function to search for intruders • Wizard to create rules for applications and to create filters

  12. Configuring Software Windows Firewall • Click start, and then control panel • In control panel, click Security Center • In Windows Security Center, under manage security settings for, click Windows Firewall • In Windows Firewall dialog box, select the Don’t allow exceptions check box • Click OK • That’s it!

  13. Configuring Windows Firewall

  14. Installing a Hardware Firewall • Found in Broadband routers • Open a browser and type in IP Address • Enter username and password • Change default password • Go into “security settings” • Change settings to the way you want • Then go to “blocking sites” • Block any site you want • For additional services, go to protecting ports • A user can pick and choose what he/she wants incoming and outgoing

  15. Virtual Private Networks • Computer network that is layered on top of an underlying computer network • Basically means, the information is not visible when in travel from point A to point B

  16. Hardware Firewalls

  17. Software VS Hardware Firewall • Software • Pros • Block most unsafe applications • Protects from outside attempts to gain access to your computer • Easy to install • Cons • On protect a single computer not network • Easier to hack • Runs on your computer

  18. Software VS Hardware Firewall • Hardware • Pros • Protects and entire network • Basically scans packet to make sure alright to allow • Cons • Harder to configure • More expensive • Don’t run on your computer • Overall • Best protection - - HAVE BOTH!!

More Related