By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Module 5: Configuring Access for Remote Clients and Networks.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 11 Firewalls.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Beyond Security Ltd. Port Knocking Beyond Security Noam Rathaus CTO Sunday, July 11, 2004 Presentation on.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
David Abarca, Instructor Del Mar College Computer Corner Free Security Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Module 11: Designing Security for Network Perimeters.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Chapter 4: Implementing Firewall Technologies
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Brooke Thorpe COSC 101-Section 7. Overview What is a Firewall? System designed to prevent unauthorized access to or from a private network Will check.
Cryptography and Network Security
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Critical Security Controls
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Securing the Network Perimeter with ISA 2004
Introduction to Networking
Firewalls.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Firewalls Routers, Switches, Hubs VPNs
FIREWALL.
Presentation transcript:

By: Keith Reiter COSC 356

Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary

Introduction What is a firewall? Filters Malicious packets Gateway between two networks usually a trusted network and untrusted networks Software and hardware based

Software Window’s firewall Norton McAfee Bit Defender

Norton

Norton Continued

Top Free Software Firewalls Zone Alarm Free Firewall PC Tools Firewall Plus Online Armor Free

Pros and Cons of Software Firewalls Cheaper Takes less room More Vulnerable to malicious attacks / lower performance Dependent upon the host operating system

Hardware based firewalls Hardware device placed somewhere in the traffic flow of a network Receives and analyzes packets traveling into and out of a network Checks access rules

Pros and Cons of hardware based firewalls Operating system independent Less vulnerable to malicious attacks / better performance Can be the single point of failure Higher administrative overhead More expensive to implement and maintain

Important Firewall Access Rules The network administrator should be able to communicate directly with the firewall. The firewall should not be able to communicate directly with any other device. No other device should be able to communicate directly with the firewall. Other network traffic should be routed directly to the appropriate servers. All outbound communications should be allowed - unless corporate policy says otherwise. The last rule should deny entry to any packet that does not match any other rule.

Firewall Logging Activate logging on the firewall and review the summary of recent events Generate reports from the raw data Analyze the report and identify any potential issues Modify the firewall's access rules to deal with potential issues After any changes have been made, review the log files again to ensure that the changes achieved the desired results

Who needs a firewall? Anyone that connects to a network At home on your personal computer Businesses

At home Usually software based Need to protect personal information such as banking information

Businesses Hardware based would be better Employee information Business information and products

Tom Rowan “As more business exposes their corporate data – and that of their customers – to the internet, the firewall technology that protects them has had to evolve.”

Ali Pabari You need to deploy a firewall at more than just the perimeter. You need different layers of firewalls “The implementation of these layers of security technology will make it highly unlikely that unauthorized individuals will gain access to vital systems.”

Vince Tuesday Wrote “Good Firewalls Make Good Neighbors” “The simplest way to keep malicious code from spreading between our networks is to deploy firewalls and configure them so they limit traffic to what’s needed and block everything else.”

Matthew French Military needs a secure firewall “By deploying firewall technology embedded on personal computer network cards, participants in the war fighting exercise enforced security policies across disparate severs”

Summary Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall

Short video

QUESTIONS?

References Ali Pabari, Uday D. “Business Defense.” Certification magazine 6.4 (2004): Computers & Applied Sciences complete. Web. 9 Apr French, Matthew. “Navy Test Plug-In Security.” Federal Computer Week (2003):56. Computers & Applied Sciences Complete. Web. 11 Apr Rowan, Tom. “Application Firewalls: Filling The Void.” Network Security (2007): 4-7. Computers & Applied Science Complete. Web. 7 Apr Tuesday, Vince. “Good Firewalls Make Good Neighbors.” Computerworld 37.50(2003):34. Computer & Applied Sciences Complete. Web. 10 Apr. 2012