1 / 9

SEMINAR ON

SEMINAR ON . Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade. Intro to Security. Computer/Network Security - The prevention and detection of unauthorized actions by users of computer systems*

shaw
Download Presentation

SEMINAR ON

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEMINAR ON Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade

  2. Intro to Security • Computer/Network Security - The prevention and detection of unauthorized actions by users of computer systems* • But what does “unauthorized” mean? • It depends on the system’s “security policy”

  3. Security Policy • A “security policy” defines the security rules of a system. • Without a defined security policy, there is no way to know what access is allowed or disallowed • An example policy: (simple) • Allow all connections to the web server • Deny all other access

  4. Firewalls • In most systems today, the firewall is the machine that implements the “security policy” for a system • A firewall is typically placed at the edge of a system and acts as a filter for unauthorized traffic • Filters tend to be simple: source and destination addresses, source and destination ports, or protocol (tcp, udp, icmp)

  5. Firewall Example

  6. Firewall Drawbacks • Depends on the topology of the network • Do not protect networks from the internal attacks. • Unable to handle protocols like FTP and RealAudio • Has single entry point and the failure of this leads to problems • Unable to stop "spoofed" transmissions (i.e., using false source addresses). • Unable to log all of the network's activity and unable to dynamically open and close their networking ports.

  7. Distributed Firewall Concept • A distributed firewall is a mechanism to enforce a network domain security policy through the use of a policy language • a policy distribution scheme enabling policy control from a central point and certificates, enabling the identification of any member of the network policy domain • Distributed firewalls secure the network by protecting critical network endpoints, exactly where hackers want to penetrate.

  8. It filters traffic from both the Internet and the internal network because the most destructive and costly hacking attacks still originate from within the organization • This is important because the most costly and destructive attacks still originate from within the organization.

  9. Questions?

More Related