Download presentation
Presentation is loading. Please wait.
Published byShannon Bailey Modified over 8 years ago
1
By: Keith Reiter COSC 356
2
Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary
3
Introduction What is a firewall? Filters Malicious packets Gateway between two networks usually a trusted network and untrusted networks Software and hardware based
4
Software Window’s firewall Norton McAfee Bit Defender
5
Norton
6
Norton Continued
12
Top Free Software Firewalls Zone Alarm Free Firewall PC Tools Firewall Plus Online Armor Free
13
Pros and Cons of Software Firewalls Cheaper Takes less room More Vulnerable to malicious attacks / lower performance Dependent upon the host operating system
14
Hardware based firewalls Hardware device placed somewhere in the traffic flow of a network Receives and analyzes packets traveling into and out of a network Checks access rules
15
Pros and Cons of hardware based firewalls Operating system independent Less vulnerable to malicious attacks / better performance Can be the single point of failure Higher administrative overhead More expensive to implement and maintain
16
Important Firewall Access Rules The network administrator should be able to communicate directly with the firewall. The firewall should not be able to communicate directly with any other device. No other device should be able to communicate directly with the firewall. Other network traffic should be routed directly to the appropriate servers. All outbound communications should be allowed - unless corporate policy says otherwise. The last rule should deny entry to any packet that does not match any other rule.
17
Firewall Logging Activate logging on the firewall and review the summary of recent events Generate reports from the raw data Analyze the report and identify any potential issues Modify the firewall's access rules to deal with potential issues After any changes have been made, review the log files again to ensure that the changes achieved the desired results
18
Who needs a firewall? Anyone that connects to a network At home on your personal computer Businesses
19
At home Usually software based Need to protect personal information such as banking information
20
Businesses Hardware based would be better Employee information Business information and products
21
Tom Rowan “As more business exposes their corporate data – and that of their customers – to the internet, the firewall technology that protects them has had to evolve.”
22
Ali Pabari You need to deploy a firewall at more than just the perimeter. You need different layers of firewalls “The implementation of these layers of security technology will make it highly unlikely that unauthorized individuals will gain access to vital systems.”
23
Vince Tuesday Wrote “Good Firewalls Make Good Neighbors” “The simplest way to keep malicious code from spreading between our networks is to deploy firewalls and configure them so they limit traffic to what’s needed and block everything else.”
24
Matthew French Military needs a secure firewall “By deploying firewall technology embedded on personal computer network cards, participants in the war fighting exercise enforced security policies across disparate severs”
25
Summary Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall
26
Short video http://www.youtube.com/watch?v=wQIA_KTPDeI
27
QUESTIONS?
28
References http://www.youtube.com/watch?v=wQIA_KTPDeI http://decipherinfosys.com/Firewall.pdf Ali Pabari, Uday D. “Business Defense.” Certification magazine 6.4 (2004): 40-43. Computers & Applied Sciences complete. Web. 9 Apr. 2012. French, Matthew. “Navy Test Plug-In Security.” Federal Computer Week 17.20 (2003):56. Computers & Applied Sciences Complete. Web. 11 Apr. 2012. Rowan, Tom. “Application Firewalls: Filling The Void.” Network Security 2007.4 (2007): 4-7. Computers & Applied Science Complete. Web. 7 Apr. 2012. Tuesday, Vince. “Good Firewalls Make Good Neighbors.” Computerworld 37.50(2003):34. Computer & Applied Sciences Complete. Web. 10 Apr. 2012
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.