Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.

Slides:



Advertisements
Similar presentations
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
HIPAA Security Standards What’s happening in your office?
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Security Awareness: Applying Practical Security in Your World
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Computer Networks IGCSE ICT Section 4.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Networking Components Chad Benedict – LTEC
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
The Intranet.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
A Network Security -Firewall Bruce Turin.
Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
Assignment 3 Jacob Seiz. Hub A hub provides a central access point for a network. Through multiple I/O ports a hub can connect multiple Ethernet devices.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Defining Network Infrastructure and Network Security Lesson 8.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Firewall Techniques Matt Cupp.
The Intranet.
Top 5 Open Source Firewall Software for Linux User
What is a Firewall?.
(A CORPORATE NETWORK APPROACH)
Internet and Intranet.
Network Security Marshall Leitem 11/30/04
Computer Networking Devices
Computer Data Security & Privacy
Introduction to Networking
Firewalls.
Security in Networking
Internet and Intranet.
Network Security: IP Spoofing and Firewall
Digital Pacman: Firewall Edition
Firewalls.
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
Internet and Intranet.
Fire-wall.
AbbottLink™ - IP Address Overview
Home Security in the Age of Broadband
FIREWALL.
Firewall Installation
Internet and Intranet.
Hosted Security.
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Brooke Thorpe COSC 101-Section 7

Overview

What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check messages entering and leaving and block those that do not meet the specified security criteria Considered the first line of defense in protecting private information Can be Hardware or Software

Common Misconceptions of Firewalls

Firewall Techniques Packet Filter Accepts or rejects packets based on the rules defined by the user Application Gateway Security to specific applications Circuit-level Gateway Applies security mechanisms when a TCP connection is established Proxy Server Intercepts messages entering and leaving the network

Hardware Firewalls Can be a stand-alone product but typically found in broadband routers Use packet filtering Protects the system from the outside Pros: easy to set up, protect every machine on the local network Cons: treats any kind of traffic from the local network to the internet as safe

Software Firewalls Installed on your computer Can block or allow a program’s ability to send and receive data Pros: knows what program is trying to access the internet and if it is malicious or not Cons: only protect the machine installed on

Common Firewall Systems Cisco Work with high end and large enterprise systems Very expensive NetGear Low end hardware security (not recommended) Hotbrick Good firewall system for reasonable price Home offices SonicWall Good firewall Medium to large scale company use

Conclusion A firewall is one way you can keep your computer and its contents safe but should not be your only line of defense Firewalls can be hardware or software but often work best together Firewalls use many different types of techniques to keep information safe Installing a firewall is easy and it is also easy to obtain

Bibliography "The Differences and Features of Hardware & Software Firewalls - Webopedia.com." Webopedia: Online Computer Dictionary for Computer and Internet Terms and Definitions. Web. 01 Dec "Firewall Brands." Ethical Hacking for Beginners. Web. 01 Dec "Firewall Debate: Hardware vs. Software." The Online Tech Resource for Small Business Owners and Managers - Small Business Computing. Web. 01 Dec "Firewall Myths Exposed - Keep Your System and Firewall Secure With the Truth." Find Science & Technology Articles, Education Lesson Plans, Tech Tips, Computer Hardware & Software Reviews, News and More at Bright Hub. Web. 01 Dec "How to Use the Windows Firewall - YouTube." YouTube - Broadcast Yourself. Web. 05 Dec "What Is Firewall? - A Word Definition From the Webopedia Computer Dictionary." Webopedia: Online Computer Dictionary for Computer and Internet Terms and Definitions. Web. 01 Dec