Sei sulla pagina 1di 13

FIREWALL SECURITY

BY ;
PRAMODH AND ADITYA.
ORIGIN OF FIREWALL :-
 ORIGINALLY REFFERED TO A “WALL” .

 CONSTRUCTED TO HALT SPREAD OF “FIRE”.

 WHAT IT ACTUALLY MEANS IN WORLD OF COMPUTER ?

 IT FORMS A “BARRIER”

 BETWEEEN A TRUSTED AND UNTRUSTED NETWORK .

 IT BLOCKS CERTAIN KINDS OF TRAFFIC .

 IT CAN BE A STAND ALONE MACHINE OR SOFTWARE IN A ROUTER OR SERVER


WHAT IS “FIREWALL SECURTIY” ?

 A firewall is a security policy enforcement point that regulates access between computer networks

 Filters are inherently insecure services

 Controls TCP protocols


http, smtp, ftp, telnet etc

 TCP:- “TRANSMISSION CONTROL PROTOCOL”

 ESTABLISHES AND MAINTAINS A NETWORK CONVERSATION.

 TOGETHER TCP AND IP ARE THE BASIC RULES FOR DEFINING THE INTERNET.
Who do Firewalls Guard Against?
 INTERNAL USERS

 HACKERS

 CORPORATE ESPIONAGE

 TERROISTS

 COMMON THIEVES
Common Internet Threats :-
 Denial of service attacks
Specific attacks that can cause a server crash
Flooding the server with traffic to disrupt or deny service

 Intrusion threats

 Attacks on services/exploits

 The backend server may not be hardened enough for adequate protection, but the firewall can block
external attacks

 Information threats

 “Viral” threats

 Defacement
TYPES OF FIREWALL SECURITY:-

1. PACKET FILTERING FIREWALL

2. STATEFUL FIREWALL

3. DEEP PACKET INSPECTION FIREWALL

4. APPLICATION-AWARE FIREWALL

5. APPLICATION PROXY FIREWALL


PACKET FILTERING FIREWALL:-
 IT IS A FIREWALL TECHNIQUES USED TO CONTROL NETWORK ACCESS.

 MONITORS OUTGOING AND INCOMING PACKETS.

 BY ALLOWING THEM TO PASS OR HALT BASE ON THE SOURCE.

 AND DESTINATION INTERNET PROTOCOL(IP) ADDRESSES PROTOCOLS AND PORTS.

 IT IS ALSO KNOWN AS STATIC FILTERING.


STATEFUL FIREWALL:-
 IT IS ALSO KNOWN AS “DYNAMIC PACKET FILTERING”

 IT IS A FIREWALL TECHNOLOGY THAT MONITORS THE STATE OF ACTIVE CONNECTIONS.

 AND USES THIS INFORMATION TO DETERMINE WHICH NETWORK PACKETS TO ALLOW THROUGH THE
FIREWALL

 IN STATIC PACKET FILTERING ONLY THE HEADERS OF PACKETS ARE CHECKED.

 WHICH MEANS THAT AN ATTACKER CAN SOMETIMES GET INFORMATION.

 BY SIMPLY INDICATING “REPLY” IN THE HEADER.


DEEP PACKET INSPECTION FIREWALL:-
 IT IS AN ADVANCED OF EXAMINING AND MANAGING NETWORK TRAFFIC.

 IT IS A FORM OF PACKET FILTERING THAT,


-> LOCATES
-> IDENTIFIES
-> CLASSIFIES
-> REROUTES
-> BLOCKS

 WITH SPECIFIC DATA OR CODE PAYLOADS


 THAT CONVETIONAL PACKET FILTERING.

 WHICH EXAMINES ONLY PACKET HEADERS.


APPLICATION –AWARE FIREWALL:-

 IT IS A FORM OF FIREWALL THAT CONTROLS


-> INPUT
->OUTPUT
->AND/OR ACCESS FROM
->TO
OR BY AN APPLICATION OR SERVICE

 THIS APPLICATION FIREWALL IS TYPICALLY


BUILT TO CONTROL ALL NETWORK TRAFFIC
ON ANYWAYS OSI LAYER UPTO THE APPLICATION
LAYER.
APPLICATION PROXY FIREWALL:-
 IT PROTECTS NETWORK RESOURCES BY FILTERING MESSAGES AT THE APPLICATION LAYER.

 IT IS ALSO CALLED AS AN APPLICATION LAYER OR GATEWAY FIREWALL.

 A PROXY FIREWALL ACTS AS AN INTERMEDIARY BETWEEN IN-HOUSE CLIENTS AND SERVERS ON THE
INTERNET

Potrebbero piacerti anche