SlideShare a Scribd company logo
Home Network Security – Your First Line of Defense   Presentation BY:  Laurie Kunkler Nate Hartmann Ferid ZNaIdia Taylan malak
Team network
Basic Overview & Objectives What is a home network What is a firewall Why does it need a firewall What does a firewall actually do How does a firewall work How to obtain a firewall/How to check if you currently have a fire wall Hardware firewalls vs. software firewalls and antivirus software
What is a Home Network? Two or more computers in the home that are interconnected for file sharing and/or Internet access.
The main advantage of a network is that multiple users can simultaneously interact with each other and share resources, for example the internet connection  After the home network is created, if using a wireless router many wireless devices such as laptops can connect to it.  Set up can be easy for those who are computer savvy - we will be explaining later on how simple it can be  You can also add devices to the network like a printer. This will allow anyone with access rights to be able to print a file on any of the computers connected to the network Advantages and Disadvantages of Home Networks SOME ADVANTAGES  SOME DISADVANTAGES Equipment can add up and be costly Set up can be challenging for those who are not computer savvy  If wireless on the router is not secured, anyone within range could be stealing the Internet connection and potentially result other outside users access to personal data. (we will discuss firewalls later in presentation)
What is a Firewall? Secure internet gateway that is used in  order to interconnect a private network  to the  internet. A system designed to prevent  unauthorized access to or from a private  network.  Firewalls can be implemented in both  hardware and software, or a  combination of both.  Firewalls are frequently used to prevent  unauthorized Internet users from  accessing private networks connected  to the Internet, especially intranets.
You Lock Your House Doors and Windows – Why Not Your Network
What does a firewall do? It keeps harmful packets of data from entering or exiting your local area network (LAN) Blocks humans or programs from entering your LAN Administrators set guidelines or rules for what is allowed in or out A firewall is an integral part of a home network security system but more is needed If a user tells the system that certain data or applications are “OK” to pass through the firewall, it will not stop those information packets from entering
How does a firewall work? A perfect firewall would allow no information to enter your network and no information to leave Administrator must determine a set of guidelines for the firewall to follow – usually to start out, it is safe to disallow everything and then only allow those data transactions which are necessary and you know are safe Firewalls are customizable using the following criteria:  IP address   216.27.61.137  Domain names  www.GetAVirusHere.com Protocols  FTP, SMTP, UDP, etc. Ports  port 20 or port 21, echo 7, telnet 23 Specific keywords or phrases  “X-rated” “Viagra”
How does a firewall work? The firewall uses one or more of the following techniques:  packet filtering or static packet filtering   Checks the header of every packet of  information as it enters or exits the network  –  only allows packets that are approved proxy server or application layer firewall stateful inspection or dynamic packet filtering Monitors header and application level of each packet Tracks accepted and denied packet in a table for finer sorting of data transfer or blockage More involved and active filtering than static packet filtering Internet Proxy Server
 
How to find my Firewall? A firewall is a piece of software or hardware that sits between a private network and a public network. A personal firewall is included with Windows XP/ VISTA/ Mac. It will block inbound attacks but will not control network access to programs running on your computer.  It is a valuable security tool and should be enabled on most Windows XP/ VISTA/ Mac computers.
  How to Find My Firewall  continued Windows Vista or Windows XP Service Pack 2 Click "Start," then "Control Panel.“ Click "Security Center.“ Click "Windows Firewall." Mac Operating System Click the Apple icon, then "System Preferences.“ Select "View," then "Sharing," then "Firewall.“ Select "Security" if you have Mac OS X 10.5 (Leopard),  Then click the "Firewall" tab. Windows XP Click "Start," then "Control Panel.“ Click "Network and Internet Connections,"  Then "Network Connections.“ Click the icon of the connection you wish to protect, such as Dial-Up or LAN or High Speed Internet. On the left, under "Network Tasks,"  Click "Change settings of this connection“ Select "Internet Connection Firewall."
How Do I Enable Windows XP Internet Connection Firewall? Note :  If you don't have an  Advanced  Tab : right-click  Local Area Connection  again  Click  Remove from Bridge . Then go back to  Properties  and  Advanced Tab . Check the box labeled "Protect my computer and network by limiting or preventing access to this computer from the Internet". Click OK To enable Firewall: Click  Start  Click  Control Panel . Click  Network and Internet Connections Click the  Network Connections  Control Panel Icon Right-click  Local Area Connection  and select  Properties Click the  Advanced  Tab
Do I have one already?    How to Find My Firewall  Click "Start,"  Then click "All Programs.“ Search for the firewall program. (third-party firewall programs include McAfee, Symantec and Tiny Personal Firewall) Find the third party software program  Select the program icon in the bottom right-hand corner of the computer screen.
Hardware   firewall  vs.  Software   firewalls   Software firewalls   Provide level of protection to keep safe from hackers and other unwanted intrusions.  Software is far easier for computer novices to customize.  Some top software firewall packages include anti-spam, antivirus, even  anti-popup ad software.  Some software firewalls include parental controls – websites children visit.  Some packages allow you to block photos and specific text content . The features are suited to smaller home networks. Hardware firewall   A small metal box filled with plug openings, or ports. You hook  the computer network into the box then set it up on your computer.  Hardware firewalls are typically found in broadband routers. A hardware firewall is less vulnerable than a software firewall. Hardware firewalls are best suited to businesses and large networks .
WHICH FIREWALL TO BUY?
Third-Party Personal Software Basic Features: -Block incoming and outgoing threats . computer might have outgoing threats when its infected by viruses, Trojans, or spyware -Distinguish between threats and legitimate software . include a list of safe software for the firewall to check . malware to block it . issue a pop up alert for the user asking for advice on what to do Recommended personal firewalls with links to vendors: Online Armor Checkpoint  ZoneAlarm  Firewall PC Tools Firewall Plus Private Firewall Comodo  Firewall Pro Agnitum  Outpost Firewall Pro
Basic Features: - Include two or more security features: . Personal Firewall . Anti-Virus  . Anti-Spyware Recommended Internet security (IS) suites with links to vendors: Norton Internet Security 2011   Norton 360 V 5.0 Kaspersky  IS 2011 BitDefender  IS 2011 Webroot  IS Complete Internet Security Software Suites
Hardware Firewalls Basic Features: -Based on “NAT” which hides your computer from the internet .  “NAT” Plus can be purchased for more protection -Three basic types of hardware devices:  .  Wired Routers . Wireless Routers . Broadband Gateways Recommended hardware firewall products with links to vendors:  D-Link 655  Xtreme  N Wireless Router with  QoS  and Gigabit Ports ZoneAlarm Secure Wireless Router
Source List http://computer.howstuffworks.com/firewall1.htm http://www.enterprisenetworkingplanet.com/netsysm/article.php/3656121 http:// en.wikipedia.org/wiki/Stateful_firewall http:// www.akadia.com/services/firewall_proxy_server.html http://tldp.org/HOWTO/Firewall-HOWTO-3.html http:// www.youtube.com/watch?v =6UtiQwCX2wU&feature=related http:// www.firewallguide.com / http:// www.webopedia.com/TERM/P/packet_filtering.html http:// www.webopedia.com/TERM/F/firewall.html   http://www.ehow.com/how_5859839_firewall.html http://www.webopedia.com/DidYouKnow/Hardware_Software/2004/firewall_types.asp

More Related Content

PPTX
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
PDF
Firewall
PDF
Importance of Using Firewall for Threat Protection
PPT
Firewall presentation m. emin özgünsür
PPS
Outpost networksecurity
PPTX
Introduction of firewall slides
PPT
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Firewall
Importance of Using Firewall for Threat Protection
Firewall presentation m. emin özgünsür
Outpost networksecurity
Introduction of firewall slides

What's hot (20)

PPTX
Firewalls
PPT
Lecture 4 firewalls
PPTX
Wireless Networking
PPT
Network and security concepts
PDF
internet-firewalls
PPT
Network Security Tools and applications
PPTX
Network security and firewalls
PPT
Auditing Check Point Firewalls
PPT
Android Firewall project
PDF
NSA and PT
PPT
Firewalls
PDF
Wireless hacking tools.jpeg
PDF
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
PPTX
Firewalls-Intro
PDF
Topics in network security
PPT
Firewall Penetration Testing
PPTX
Security Attack Analysis for Finding and Stopping Network Attacks
PPTX
Network security - Defense in Depth
PPS
Internetworking With Pix Firewall
PDF
E firewalls
Firewalls
Lecture 4 firewalls
Wireless Networking
Network and security concepts
internet-firewalls
Network Security Tools and applications
Network security and firewalls
Auditing Check Point Firewalls
Android Firewall project
NSA and PT
Firewalls
Wireless hacking tools.jpeg
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Firewalls-Intro
Topics in network security
Firewall Penetration Testing
Security Attack Analysis for Finding and Stopping Network Attacks
Network security - Defense in Depth
Internetworking With Pix Firewall
E firewalls
Ad

Similar to Advanced internetfinal (20)

PPT
Firewall intro
PPTX
Firewall & packet filter new
PPTX
Firewall presentation
PPTX
csefirewall in network.ppt-170825044521.pptx
PPTX
Firewall
PPTX
PPT
FireWall
PDF
Firewall.pdf
PPT
INTRODUCTION TO FIREWELL
PDF
Security assignment (copy)
PDF
Edu 03Anju 23 assignment.pdf
PPTX
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
PPT
Firewall
 
PPTX
Firewall and its configuration
PPTX
Firewall ppt
PPTX
Firewall ppt
PDF
Firewalls Jumpstart For Network And Systems Administrators John R Vacca Scott...
PPTX
Firewall
PPTX
UNIT-4 network information security ID system
Firewall intro
Firewall & packet filter new
Firewall presentation
csefirewall in network.ppt-170825044521.pptx
Firewall
FireWall
Firewall.pdf
INTRODUCTION TO FIREWELL
Security assignment (copy)
Edu 03Anju 23 assignment.pdf
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
Firewall
 
Firewall and its configuration
Firewall ppt
Firewall ppt
Firewalls Jumpstart For Network And Systems Administrators John R Vacca Scott...
Firewall
UNIT-4 network information security ID system
Ad

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Lesson notes of climatology university.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Computing-Curriculum for Schools in Ghana
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
GDM (1) (1).pptx small presentation for students
202450812 BayCHI UCSC-SV 20250812 v17.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Classroom Observation Tools for Teachers
Supply Chain Operations Speaking Notes -ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
01-Introduction-to-Information-Management.pdf
Lesson notes of climatology university.
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Computing-Curriculum for Schools in Ghana
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx

Advanced internetfinal

  • 1. Home Network Security – Your First Line of Defense Presentation BY: Laurie Kunkler Nate Hartmann Ferid ZNaIdia Taylan malak
  • 3. Basic Overview & Objectives What is a home network What is a firewall Why does it need a firewall What does a firewall actually do How does a firewall work How to obtain a firewall/How to check if you currently have a fire wall Hardware firewalls vs. software firewalls and antivirus software
  • 4. What is a Home Network? Two or more computers in the home that are interconnected for file sharing and/or Internet access.
  • 5. The main advantage of a network is that multiple users can simultaneously interact with each other and share resources, for example the internet connection After the home network is created, if using a wireless router many wireless devices such as laptops can connect to it. Set up can be easy for those who are computer savvy - we will be explaining later on how simple it can be You can also add devices to the network like a printer. This will allow anyone with access rights to be able to print a file on any of the computers connected to the network Advantages and Disadvantages of Home Networks SOME ADVANTAGES SOME DISADVANTAGES Equipment can add up and be costly Set up can be challenging for those who are not computer savvy If wireless on the router is not secured, anyone within range could be stealing the Internet connection and potentially result other outside users access to personal data. (we will discuss firewalls later in presentation)
  • 6. What is a Firewall? Secure internet gateway that is used in order to interconnect a private network to the internet. A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
  • 7. You Lock Your House Doors and Windows – Why Not Your Network
  • 8. What does a firewall do? It keeps harmful packets of data from entering or exiting your local area network (LAN) Blocks humans or programs from entering your LAN Administrators set guidelines or rules for what is allowed in or out A firewall is an integral part of a home network security system but more is needed If a user tells the system that certain data or applications are “OK” to pass through the firewall, it will not stop those information packets from entering
  • 9. How does a firewall work? A perfect firewall would allow no information to enter your network and no information to leave Administrator must determine a set of guidelines for the firewall to follow – usually to start out, it is safe to disallow everything and then only allow those data transactions which are necessary and you know are safe Firewalls are customizable using the following criteria: IP address 216.27.61.137 Domain names www.GetAVirusHere.com Protocols FTP, SMTP, UDP, etc. Ports port 20 or port 21, echo 7, telnet 23 Specific keywords or phrases “X-rated” “Viagra”
  • 10. How does a firewall work? The firewall uses one or more of the following techniques: packet filtering or static packet filtering Checks the header of every packet of information as it enters or exits the network – only allows packets that are approved proxy server or application layer firewall stateful inspection or dynamic packet filtering Monitors header and application level of each packet Tracks accepted and denied packet in a table for finer sorting of data transfer or blockage More involved and active filtering than static packet filtering Internet Proxy Server
  • 11.  
  • 12. How to find my Firewall? A firewall is a piece of software or hardware that sits between a private network and a public network. A personal firewall is included with Windows XP/ VISTA/ Mac. It will block inbound attacks but will not control network access to programs running on your computer. It is a valuable security tool and should be enabled on most Windows XP/ VISTA/ Mac computers.
  • 13. How to Find My Firewall continued Windows Vista or Windows XP Service Pack 2 Click "Start," then "Control Panel.“ Click "Security Center.“ Click "Windows Firewall." Mac Operating System Click the Apple icon, then "System Preferences.“ Select "View," then "Sharing," then "Firewall.“ Select "Security" if you have Mac OS X 10.5 (Leopard), Then click the "Firewall" tab. Windows XP Click "Start," then "Control Panel.“ Click "Network and Internet Connections," Then "Network Connections.“ Click the icon of the connection you wish to protect, such as Dial-Up or LAN or High Speed Internet. On the left, under "Network Tasks," Click "Change settings of this connection“ Select "Internet Connection Firewall."
  • 14. How Do I Enable Windows XP Internet Connection Firewall? Note : If you don't have an  Advanced Tab : right-click  Local Area Connection  again Click  Remove from Bridge . Then go back to  Properties  and  Advanced Tab . Check the box labeled "Protect my computer and network by limiting or preventing access to this computer from the Internet". Click OK To enable Firewall: Click  Start Click  Control Panel . Click  Network and Internet Connections Click the  Network Connections  Control Panel Icon Right-click  Local Area Connection  and select  Properties Click the  Advanced  Tab
  • 15. Do I have one already? How to Find My Firewall Click "Start," Then click "All Programs.“ Search for the firewall program. (third-party firewall programs include McAfee, Symantec and Tiny Personal Firewall) Find the third party software program Select the program icon in the bottom right-hand corner of the computer screen.
  • 16. Hardware firewall vs. Software firewalls   Software firewalls Provide level of protection to keep safe from hackers and other unwanted intrusions. Software is far easier for computer novices to customize. Some top software firewall packages include anti-spam, antivirus, even anti-popup ad software. Some software firewalls include parental controls – websites children visit. Some packages allow you to block photos and specific text content . The features are suited to smaller home networks. Hardware firewall A small metal box filled with plug openings, or ports. You hook the computer network into the box then set it up on your computer. Hardware firewalls are typically found in broadband routers. A hardware firewall is less vulnerable than a software firewall. Hardware firewalls are best suited to businesses and large networks .
  • 18. Third-Party Personal Software Basic Features: -Block incoming and outgoing threats . computer might have outgoing threats when its infected by viruses, Trojans, or spyware -Distinguish between threats and legitimate software . include a list of safe software for the firewall to check . malware to block it . issue a pop up alert for the user asking for advice on what to do Recommended personal firewalls with links to vendors: Online Armor Checkpoint ZoneAlarm Firewall PC Tools Firewall Plus Private Firewall Comodo Firewall Pro Agnitum Outpost Firewall Pro
  • 19. Basic Features: - Include two or more security features: . Personal Firewall . Anti-Virus . Anti-Spyware Recommended Internet security (IS) suites with links to vendors: Norton Internet Security 2011 Norton 360 V 5.0 Kaspersky IS 2011 BitDefender IS 2011 Webroot IS Complete Internet Security Software Suites
  • 20. Hardware Firewalls Basic Features: -Based on “NAT” which hides your computer from the internet . “NAT” Plus can be purchased for more protection -Three basic types of hardware devices: . Wired Routers . Wireless Routers . Broadband Gateways Recommended hardware firewall products with links to vendors: D-Link 655 Xtreme N Wireless Router with QoS and Gigabit Ports ZoneAlarm Secure Wireless Router
  • 21. Source List http://computer.howstuffworks.com/firewall1.htm http://www.enterprisenetworkingplanet.com/netsysm/article.php/3656121 http:// en.wikipedia.org/wiki/Stateful_firewall http:// www.akadia.com/services/firewall_proxy_server.html http://tldp.org/HOWTO/Firewall-HOWTO-3.html http:// www.youtube.com/watch?v =6UtiQwCX2wU&feature=related http:// www.firewallguide.com / http:// www.webopedia.com/TERM/P/packet_filtering.html http:// www.webopedia.com/TERM/F/firewall.html http://www.ehow.com/how_5859839_firewall.html http://www.webopedia.com/DidYouKnow/Hardware_Software/2004/firewall_types.asp

Editor's Notes

  • #10: Protocols: The protocol is the pre-defined way that someone who wants to use a service talks with that service. Protocols are often text, and simply describe how the client and server will have their conversation. The http in the Web's protocol. Ports - Any server machine makes its services available to the Internet using numbered ports , one for each service that is available on the server