Firewalls
Download
1 / 15

FIREWALLS - PowerPoint PPT Presentation


  • 337 Views
  • Uploaded on

FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson What is a Firewall? A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system. History of Firewall

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'FIREWALLS' - Gabriel


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Firewalls l.jpg

FIREWALLS

Created and Presented by:

Dawn Blitch

&

Fredda Hutchinson


What is a firewall l.jpg
What is a Firewall?

  • A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.


History of firewall l.jpg
History of Firewall

  • First Generation-(1985) First security firewalls appeared. Network layer IP routers with filtering rules that had to be manually changed by the administrator. (Must have intranet access or valid IP address)

  • Second Generation-(1989-1990) Circuit level firewall gateways that prevented direct connections between networks through address authorization.


History of firewalls l.jpg
History of Firewalls

  • Third Generation-(1991) First commercial firewall (DEC SEAL), Used filters and application gateways or proxies.

  • Fourth Generation-(1994) Check Point Technologies, Firewall-1, developed “first user friendly” firewall. Used dynamic packet filters that dynamically changed filtering rules.


History of firewall5 l.jpg
History of Firewall

  • Fifth Generation-(today) Kernel Proxy architecture, which evaluates network packets at multiple layers of a protocol stack in the proxy server.


Types of firewalls l.jpg
Types of Firewalls

  • Network Layer-A hardware firewall that controls what packets or information that are passed in or out of your network


Types of firewalls7 l.jpg
Types of Firewalls

  • Application Layer-Software that does not allow direct connections between networks, which performs logging and auditing of traffic.



Cautions l.jpg

Remote Login

SMTP session hijacking

Operating system bugs

Denial of Service

E-mail bombs

Macros

Viruses

Spam

Redirect bombs

Source routing

Application backdoors

Cautions

Firewalls may only limit these items to an extent.


Slide11 l.jpg

The level of security you establish will determine how many of these threats can be stopped by your firewall. The highest level of security would simply block everything, this would defeat the purpose of having an internet connection. Basic rule of thumb for all administrators is to first block everything and then implement rules which allow only certain information or packets to pass.


Why would i want a firewall l.jpg
Why would I want a Firewall? of these threats can be stopped by your firewall. The highest level of security would simply block everything, this would defeat the purpose of having an internet connection. Basic rule of thumb for all administrators is to first block everything and then implement rules which allow only certain information or packets to pass.

  • To keep hackers out of your network while still letting you get your job done.

  • Plays an important role as a security blanket for management

  • Mainly just to help

  • Gives you a place to store secure information that people in your corporation need access to.


Do they work l.jpg
Do They Work? of these threats can be stopped by your firewall. The highest level of security would simply block everything, this would defeat the purpose of having an internet connection. Basic rule of thumb for all administrators is to first block everything and then implement rules which allow only certain information or packets to pass.

  • To simply answer this question, they work to an extent, but of course, if a true hacker wants your information they will stop at nothing to get it. And as always, there are accidents that do occur when testing new software, such as probes. So just be cautious!


Websites for firewall products l.jpg
Websites for Firewall Products of these threats can be stopped by your firewall. The highest level of security would simply block everything, this would defeat the purpose of having an internet connection. Basic rule of thumb for all administrators is to first block everything and then implement rules which allow only certain information or packets to pass.

  • http://www.mcafee.com

  • http://www.checkpoint.com

  • http://www.smartsoftwareshopper.com

  • http://www.netscreen.com


Sites used l.jpg
Sites Used of these threats can be stopped by your firewall. The highest level of security would simply block everything, this would defeat the purpose of having an internet connection. Basic rule of thumb for all administrators is to first block everything and then implement rules which allow only certain information or packets to pass.

  • http://www.interhack.net/pubs/fwfaq/

  • http://computer.howstuffworks.com/firewall.htm

  • http://dmsweb.badm.sc.edu/mgsu890/firewalls/fire2.htm


ad