FIREWALL
FEATURES OF FIREWALL

Network Policy
Advanced Authentication Mechanism
Packet Filtering
Application Gateways
NETWORK POLICY

In order to implement network
policy , an organization can issue
rules such as , only one
computer from the entire
network is allowed to establish
an ftp connection i.e. to
download some content we
have to visit that one particular
computer.
ADVANCED AUTHENTICATION

While running an
application you might be
required to enter a user
id and password. This
help to ensure that
malicious programs does
not harm your devices, if
you are confident about
that application you can
ask for the combination
of id and password by
the network admin.
PACKET FILTERING
Packets received by the
firewall are analyzed against a
database of trusted
resources, if verified than they
are allowed through
otherwise annoying message
appears on the screen.
Some firewall also logs such
request with your IP and you
may be later questioned
about your intentions while
making such request
APPLICATION GATEWAYS

Popularly known by the name of
application proxy or application
level proxy the proxy establishes
the connection with the
destination behind the firewall and
acts on behalf of the client, hiding
and protecting individual
computers on the network behind
the firewall.
FIREWALL CAN SAVE US FROM

  Remote login
  Application backdoors
  SMTP session hijacking
  Operating system bugs
  Denial of service
  E-Mail bombs
  Spam
  Source routing
WHAT IT CAN’T DO

Can’t protect you against malicious insiders
Can’t protect you against connections that don’t go
through it like TOR.
Can’t protect against completely new threats.
CONCLUSION

In order to protect ourselves from all the threats, we
actually have to block everything, but that rules out
logic of having an internet connection.
Hence the proper way is to block everything and then
allow what we need resulting in the need for a good
network administrator who completely understands the
need of an organization.

More Related Content

PPT
Safety And Security Of Data 1
PDF
Keep your Email Secure
PPTX
Auditing Archives: The Case of the File Sharing Franchisee
PPTX
Protecting Windows Networks From Malware
PDF
5 things that could get your business hacked
PPTX
How to protect pc against Malware
PPTX
7 Small Business Security Tips
PPTX
IT Security for Small Business
Safety And Security Of Data 1
Keep your Email Secure
Auditing Archives: The Case of the File Sharing Franchisee
Protecting Windows Networks From Malware
5 things that could get your business hacked
How to protect pc against Malware
7 Small Business Security Tips
IT Security for Small Business

What's hot (18)

PPTX
Vulnerability disclosure (CVE-2014-0344)
PPTX
Safeguarding Your Data
PPT
Seven Ways to Reduce Your 2009 IT Burden
PDF
Securing Mobile & Online Identity in the Cyber World
PDF
Internet security tips for Businesses
PPT
Lecture 1
PDF
Domain 5 of the CEH: Web Application Hacking
PPTX
10 Ways to Work Smarter With Packets
PPTX
Secure Code Warrior - Robust error checking
PPTX
Cyber security
PPTX
Possible security issues with data
PPTX
Website security
PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
PDF
Writing sample
PDF
Project onesample
PDF
Pentesting Your Own Wireless Networks, June 2011 Issue
PPTX
WEB ISOLATION
PPTX
Spyware, spying software, computer spying
Vulnerability disclosure (CVE-2014-0344)
Safeguarding Your Data
Seven Ways to Reduce Your 2009 IT Burden
Securing Mobile & Online Identity in the Cyber World
Internet security tips for Businesses
Lecture 1
Domain 5 of the CEH: Web Application Hacking
10 Ways to Work Smarter With Packets
Secure Code Warrior - Robust error checking
Cyber security
Possible security issues with data
Website security
Domain 4 of CEH V11: Network and Perimeter Hacking
Writing sample
Project onesample
Pentesting Your Own Wireless Networks, June 2011 Issue
WEB ISOLATION
Spyware, spying software, computer spying
Ad

Similar to Firewall (20)

PPTX
Firewall and its Types
PPTX
Firewall
PPTX
Firewall presentation
PPTX
Firewall presentation
PDF
Firewalls
PPTX
Windows firewall
PPTX
Firewall
PPTX
Firewall Design and Implementation
PPTX
Firewall Design and Implementation
PPT
Firewall
PPT
Firewalls
PPTX
firewall as a security measure (1)-1.pptx
PPTX
Firewalls by Puneet Bawa
PPTX
U-2.pptx............................................
PPTX
Firewallpresentation 100826052003-phpapp02(1)
PPTX
Firewall and Types of firewall
PPTX
Firewalls
PPT
Firewall
PPTX
PDF
FIREWALLs in an information security.ppt
Firewall and its Types
Firewall
Firewall presentation
Firewall presentation
Firewalls
Windows firewall
Firewall
Firewall Design and Implementation
Firewall Design and Implementation
Firewall
Firewalls
firewall as a security measure (1)-1.pptx
Firewalls by Puneet Bawa
U-2.pptx............................................
Firewallpresentation 100826052003-phpapp02(1)
Firewall and Types of firewall
Firewalls
Firewall
FIREWALLs in an information security.ppt
Ad

Recently uploaded (20)

PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
20th Century Theater, Methods, History.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
HVAC Specification 2024 according to central public works department
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
Trump Administration's workforce development strategy
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Computer Architecture Input Output Memory.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
20th Century Theater, Methods, History.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Cambridge-Practice-Tests-for-IELTS-12.docx
HVAC Specification 2024 according to central public works department
Virtual and Augmented Reality in Current Scenario
Share_Module_2_Power_conflict_and_negotiation.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Trump Administration's workforce development strategy
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
LDMMIA Reiki Yoga Finals Review Spring Summer
Computer Architecture Input Output Memory.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
Introduction to pro and eukaryotes and differences.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Chinmaya Tiranga quiz Grand Finale.pdf

Firewall

  • 2. FEATURES OF FIREWALL Network Policy Advanced Authentication Mechanism Packet Filtering Application Gateways
  • 3. NETWORK POLICY In order to implement network policy , an organization can issue rules such as , only one computer from the entire network is allowed to establish an ftp connection i.e. to download some content we have to visit that one particular computer.
  • 4. ADVANCED AUTHENTICATION While running an application you might be required to enter a user id and password. This help to ensure that malicious programs does not harm your devices, if you are confident about that application you can ask for the combination of id and password by the network admin.
  • 5. PACKET FILTERING Packets received by the firewall are analyzed against a database of trusted resources, if verified than they are allowed through otherwise annoying message appears on the screen. Some firewall also logs such request with your IP and you may be later questioned about your intentions while making such request
  • 6. APPLICATION GATEWAYS Popularly known by the name of application proxy or application level proxy the proxy establishes the connection with the destination behind the firewall and acts on behalf of the client, hiding and protecting individual computers on the network behind the firewall.
  • 7. FIREWALL CAN SAVE US FROM Remote login Application backdoors SMTP session hijacking Operating system bugs Denial of service E-Mail bombs Spam Source routing
  • 8. WHAT IT CAN’T DO Can’t protect you against malicious insiders Can’t protect you against connections that don’t go through it like TOR. Can’t protect against completely new threats.
  • 9. CONCLUSION In order to protect ourselves from all the threats, we actually have to block everything, but that rules out logic of having an internet connection. Hence the proper way is to block everything and then allow what we need resulting in the need for a good network administrator who completely understands the need of an organization.