Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.

Slides:



Advertisements
Similar presentations
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Advertisements

FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
AVG Internet Security 7.5 Product presentation.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Network security Process in which digital information are protected.
Firewall Slides by John Rouda
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Chapter 6: Packet Filtering
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Why do you need to think about security?  Data loss  System loss  Identity theft.
Software Firewalls © N. Ganesan, Ph.D.. Module Objectives Explore the features of a software firewall such as Zone Alarm Pro.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Windows 7 Firewall.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall Security.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Introduction to Firewalls
Lesson 11: Configuring and Maintaining Network Security
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
NetTech Solutions Protecting the Computer Lesson 10.
Lecture 12 Windows Firewall and Action Center. Firewalls Protect networks by stopping network traffic from passing through it Implemented as either a.
Module 10: Windows Firewall and Caching Fundamentals.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
XPSP2 “Basic Gotchas” Security Center “Welcome” –May be confusing –Gives a “No Antivirus” warning for machines with SAV which have NOT been patched for.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Windows Vista Configuration MCTS : Network Security.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Windows Tutorial 5 Protecting Your Computer
Firewall Techniques Matt Cupp.
What is a Firewall?.
Click to edit Master subtitle style
Introduction to Networking
Firewalls.
Information Security Session October 24, 2005
Computer Security.
Firewalls Purpose of a Firewall Characteristic of a firewall
Computer Security.
Firewalls Routers, Switches, Hubs VPNs
Fire-wall.
Firewalls Chapter 8.
FIREWALL.
Presentation transcript:

Introduction to Firewalls TEC 236

What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer

What is a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates a computer or network from the “outside” based on a defined set of rules –Inspects each individual "packet" of data as it arrives at either side of the firewall –Maintains a state table –Determine whether traffic should be allowed to pass or be blocked

INTERNE T Firewall Protected Network WHO ? WHEN ? WHAT ? HOW ? My PC Rules Determine

Hardware vs. Software Firewalls Hardware Firewalls –Protect an entire network –Implemented on the router level –Usually more expensive, harder to configure Software Firewalls –Protect a single computer –Usually less expensive, easier to configure

How does a software firewall work? Inspects each individual “packet” of data as it arrives at either side of the firewall Inbound to or outbound from your computer Determines whether it should be allowed to pass through or if it should be blocked

Firewall Rules Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.) Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through

What a personal firewall can do Stop hackers from accessing your computer Protects your personal information Blocks “pop up” ads and certain cookies Determines which programs can access the Internet

What a personal firewall cannot do Cannot prevent viruses –Only an antivirus product with updated definitions can prevent viruses After setting it initially, you can forget about it –The firewall will require periodic updates to the rulesets and the software itself

Considerations when using personal firewall software If you did not initialize an action and your firewall picks up something, you should most likely deny it and investigate it It’s a learning process (Ex. Spooler Subsystem App) If you notice you cannot do something you did prior to the installation, there is a good chance it might be because of your firewall

Examples of personal firewall software ZoneAlarm BlackICE Defender Tiny Personal Firewall Norton Personal Firewall

Windows XP Firewall Currently *not* enabled by default Enable under Start -> Settings -> Control Panel Select Local Area Connection Select the Properties button Click the “Advanced” tab

Windows XP firewall

Updates to Windows XP Firewall *Will* be enabled in default installations of Windows XP Service Pack 2 Ports will be closed except when they are in use Improved user interface for easier configuration Improved application compatibility when firewall is enabled

Final Notes Rule Management Default Allow vs. Default Deny Firewalls do NOT Solve the Entire Problem