SlideShare ist ein Scribd-Unternehmen logo
1 von 38
 A firewall forms a barrier through which the traffic going in each direction
must pass. A firewall security policy dictates which traffic is authorized to
pass in each direction.
 Firewall is an effective means of protecting a local system or network of
systems from network based security threats while at the same time
affording access to outside world via WAN or Internet.
◦ All traffic from inside to outside and vice versa, must pass
through the firewall (physically blocking all access to the
local network except via the firewall).
◦ Only authorized traffic (defined by the local security policy)
will be allowed to pass.
 Service control
◦ Determines the types of Internet services that can be accessed,
inbound or outbound.
 Direction control
◦ Determines the direction in which particular service requests
are allowed to flow through the firewall.
 User control
◦ Controls access to a service according to which user is
attempting to access it.
 Behavior control
◦ Controls how particular services are used (e.g. filter e-mail).
 cannot protect against attacks bypassing it.
◦ eg sneaker net, utility modems.
 cannot protect against internal threats.
◦ eg disgruntled employee
 cannot protect against transfer of all virus
infected programs or files.
◦ because of huge range of O/S & file types
 What Is Firewall?
 Name The Techniques Involved In Firewall?
 Explain any two techniques?
 Any Two Limitations Of Firewall?
 Three common types of Firewalls:
◦ Packet-filtering routers
◦ Application-level gateways
◦ Circuit-level gateways
◦ Bastion host
◦ Applies a set of rules to each incoming IP packet
and then forwards or discards the packet.
◦ Filter packets going in both directions.
◦ The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header.
◦ Two default policies (discard or forward).
 Advantages:
◦ Simplicity
◦ Transparency to users
◦ High speed
 Disadvantages:
◦ Difficulty of setting up packet filter rules
◦ Lack of Authentication
 Possible attacks and appropriate countermeasures
◦ IP address spoofing
◦ Source routing attacks
◦ Tiny fragment attacks
 examine each IP packet in context
– keeps tracks of client-server sessions
– checks each packet validly belongs to one
 better able to detect bogus packets out of context
 Application-level Gateway
◦ Also called proxy server.
◦ Acts as a relay of application-level traffic.
 Advantages:
◦ Higher security than packet filters.
◦ Easy to log and audit all incoming traffic.
 Disadvantages:
◦ Additional processing overhead on each
connection (gateway as splice point).
 Circuit-level Gateway
◦ Stand-alone system or
◦ Specialized function performed by an The
gateway typically Application-level Gateway
◦ Sets up two TCP connections
◦ relays TCP segments from one connection to
the other without examining the contents
◦ A system identified by the firewall
administrator as a critical strong point in the
network´s security.
◦ The bastion host serves as a platform for an
application-level or circuit-level gateway.
What are the types of firewall?
 What is packet filter?
 Name the possible attacks involved in packet
filter?
 What is Application level gateway?
 what is circiut level gateway?
 Difference between application and circiut level
gateway?
 In addition to the use of simple configuration of a
single system (single packet filtering router or single
gateway), more complex configurations are possible.
 Screened host firewall system (single-homed bastion
host)
 Screened host firewall syste (dual-homed bastion host)
 Screened-subnet firewall system
Screened host firewall, single-homed bastion
configuration
 Firewall consists of two systems:
◦ A packet-filtering router.
◦ A bastion host.
 Configuration for the packet-filtering router:
◦ Only packets from and to the bastion host are
allowed to pass through the router.
 The bastion host performs authentication and proxy
functions.
Screened host firewall, dual-homed
bastion configuration
◦ The packet-filtering router is not completely
compromised.
◦ Traffic between the Internet and other hosts
on the private network has to flow through
the bastion host.
 Screened subnet firewall configuration
◦ Most secure configuration of the three.
◦ Two packet-filtering routers are used.
◦ Creation of an isolated sub-network.
 Advantages:
◦ Three levels of defense to thwart intruders.
◦ The outside router advertises only the existence
of the screened subnet to the Internet (internal
network is invisible to the Internet).
◦ The inside router advertises only the existence
of the screened sub-net to the internal network (
the systems on the inside cannot construct direct
routes to the internet.
• given system has identified a user
• determine what resources they can access
• general model is that of access matrix with
– subject - active entity (user, process)
– object - passive entity (file or resource)
– access right – way object can be accessed
• information security is increasingly important
• have varying degrees of sensitivity of information
– cf military info classifications: confidential, secret
etc
• subjects (people or programs) have varying
rights of access to objects (information)
• want to consider ways of increasing confidence
in systems to enforce these rights
• known as multilevel security
– subjects have maximum & current security level
– objects have a fixed security level classification
Firewall
Firewall

Weitere ähnliche Inhalte

Was ist angesagt?

WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptDimpyJindal4
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Samip jain
 
Authentication methods
Authentication methodsAuthentication methods
Authentication methodssana mateen
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSAHouda Elmoutaoukil
 

Was ist angesagt? (20)

Dmz
Dmz Dmz
Dmz
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Security threats
Security threatsSecurity threats
Security threats
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Authentication methods
Authentication methodsAuthentication methods
Authentication methods
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Web security
Web securityWeb security
Web security
 
Acl
AclAcl
Acl
 

Andere mochten auch (18)

coloring method
 coloring method coloring method
coloring method
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01
 
Slides cao
Slides caoSlides cao
Slides cao
 
C sharp notes
C sharp notesC sharp notes
C sharp notes
 
3 a. hil climbing
3 a. hil climbing3 a. hil climbing
3 a. hil climbing
 
Sp800 94.pdf
Sp800 94.pdfSp800 94.pdf
Sp800 94.pdf
 
Des1
Des1Des1
Des1
 
i_os_development_environment
i_os_development_environmenti_os_development_environment
i_os_development_environment
 
Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02
Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02
Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02
 
Embedded
EmbeddedEmbedded
Embedded
 
Android ax app wcf
Android ax app wcfAndroid ax app wcf
Android ax app wcf
 
Classical cryptography1
Classical cryptography1Classical cryptography1
Classical cryptography1
 
Caqa5e ch1 with_review_and_examples
Caqa5e ch1 with_review_and_examplesCaqa5e ch1 with_review_and_examples
Caqa5e ch1 with_review_and_examples
 
Nelson Mandela
Nelson Mandela Nelson Mandela
Nelson Mandela
 
Advanced databases -client /server arch
Advanced databases -client /server archAdvanced databases -client /server arch
Advanced databases -client /server arch
 
Aes
AesAes
Aes
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 

Ähnlich wie Firewall

Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8limsh
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.abidhassan225
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfCSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfssuser1f1964
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 

Ähnlich wie Firewall (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall
FirewallFirewall
Firewall
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall
FirewallFirewall
Firewall
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
Seminar
SeminarSeminar
Seminar
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfCSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 

Kürzlich hochgeladen

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 

Kürzlich hochgeladen (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 

Firewall

  • 1.
  • 2.  A firewall forms a barrier through which the traffic going in each direction must pass. A firewall security policy dictates which traffic is authorized to pass in each direction.  Firewall is an effective means of protecting a local system or network of systems from network based security threats while at the same time affording access to outside world via WAN or Internet.
  • 3. ◦ All traffic from inside to outside and vice versa, must pass through the firewall (physically blocking all access to the local network except via the firewall). ◦ Only authorized traffic (defined by the local security policy) will be allowed to pass.
  • 4.  Service control ◦ Determines the types of Internet services that can be accessed, inbound or outbound.  Direction control ◦ Determines the direction in which particular service requests are allowed to flow through the firewall.  User control ◦ Controls access to a service according to which user is attempting to access it.  Behavior control ◦ Controls how particular services are used (e.g. filter e-mail).
  • 5.  cannot protect against attacks bypassing it. ◦ eg sneaker net, utility modems.  cannot protect against internal threats. ◦ eg disgruntled employee  cannot protect against transfer of all virus infected programs or files. ◦ because of huge range of O/S & file types
  • 6.
  • 7.  What Is Firewall?  Name The Techniques Involved In Firewall?  Explain any two techniques?  Any Two Limitations Of Firewall?
  • 8.  Three common types of Firewalls: ◦ Packet-filtering routers ◦ Application-level gateways ◦ Circuit-level gateways ◦ Bastion host
  • 9.
  • 10. ◦ Applies a set of rules to each incoming IP packet and then forwards or discards the packet. ◦ Filter packets going in both directions. ◦ The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header. ◦ Two default policies (discard or forward).
  • 11.
  • 12.
  • 13.  Advantages: ◦ Simplicity ◦ Transparency to users ◦ High speed  Disadvantages: ◦ Difficulty of setting up packet filter rules ◦ Lack of Authentication
  • 14.  Possible attacks and appropriate countermeasures ◦ IP address spoofing ◦ Source routing attacks ◦ Tiny fragment attacks
  • 15.  examine each IP packet in context – keeps tracks of client-server sessions – checks each packet validly belongs to one  better able to detect bogus packets out of context
  • 16.
  • 17.
  • 18.  Application-level Gateway ◦ Also called proxy server. ◦ Acts as a relay of application-level traffic.  Advantages: ◦ Higher security than packet filters. ◦ Easy to log and audit all incoming traffic.  Disadvantages: ◦ Additional processing overhead on each connection (gateway as splice point).
  • 19.
  • 20.  Circuit-level Gateway ◦ Stand-alone system or ◦ Specialized function performed by an The gateway typically Application-level Gateway ◦ Sets up two TCP connections ◦ relays TCP segments from one connection to the other without examining the contents
  • 21.
  • 22. ◦ A system identified by the firewall administrator as a critical strong point in the network´s security. ◦ The bastion host serves as a platform for an application-level or circuit-level gateway.
  • 23. What are the types of firewall?
  • 24.  What is packet filter?  Name the possible attacks involved in packet filter?  What is Application level gateway?  what is circiut level gateway?  Difference between application and circiut level gateway?
  • 25.  In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible.
  • 26.  Screened host firewall system (single-homed bastion host)  Screened host firewall syste (dual-homed bastion host)  Screened-subnet firewall system
  • 27.
  • 28. Screened host firewall, single-homed bastion configuration  Firewall consists of two systems: ◦ A packet-filtering router. ◦ A bastion host.  Configuration for the packet-filtering router: ◦ Only packets from and to the bastion host are allowed to pass through the router.  The bastion host performs authentication and proxy functions.
  • 29.
  • 30. Screened host firewall, dual-homed bastion configuration ◦ The packet-filtering router is not completely compromised. ◦ Traffic between the Internet and other hosts on the private network has to flow through the bastion host.
  • 31.
  • 32.  Screened subnet firewall configuration ◦ Most secure configuration of the three. ◦ Two packet-filtering routers are used. ◦ Creation of an isolated sub-network.
  • 33.  Advantages: ◦ Three levels of defense to thwart intruders. ◦ The outside router advertises only the existence of the screened subnet to the Internet (internal network is invisible to the Internet). ◦ The inside router advertises only the existence of the screened sub-net to the internal network ( the systems on the inside cannot construct direct routes to the internet.
  • 34. • given system has identified a user • determine what resources they can access • general model is that of access matrix with – subject - active entity (user, process) – object - passive entity (file or resource) – access right – way object can be accessed
  • 35.
  • 36. • information security is increasingly important • have varying degrees of sensitivity of information – cf military info classifications: confidential, secret etc • subjects (people or programs) have varying rights of access to objects (information) • want to consider ways of increasing confidence in systems to enforce these rights • known as multilevel security – subjects have maximum & current security level – objects have a fixed security level classification