SlideShare a Scribd company logo
1
Principles of Cyber
Security
Lecture 05: Managing Network Security
Dr. Muamer Mohammed
Objectives
5.1 List and discuss the various types of
firewalls and the common approaches
to firewall implementation.
5.2 Define and describe the types of
intrusion detection and prevention
systems and the strategies on which
they are based
3
Firewalls
In InfoSec, a firewall is any device that prevents a
specific type of information from moving between
the outside world, known as the untrusted network
(e.g., the Internet), and the inside world, known as
the trusted network
4
Categories of Firewalls
The most common types of firewalls are:
Packet filtering firewalls
Application layer proxy firewalls
Stateful packet inspection firewalls
Unified Threat Management (UTM) devices
5
Packet Filtering Firewalls
Packet filtering firewalls are simple networking devices that filter
packets by examining every incoming and outgoing packet
header
They can selectively filter packets based on values in the packet
header, accepting or rejecting packets as needed
These devices can be configured to filter based on IP address,
type of packet, port request, and/or other elements present in
the packet
6
Packet Filtering Firewalls
Figure 5-1: Packet Filtering Firewalls
7
•Similar to UTM devices, next-generation firewalls
(NextGen or NGFW) combine traditional firewall
functions with other network security functions such as
deep packet inspection, IDPSs, and the ability to decrypt
encrypted traffic
•The functions are so similar to those of UTM devices that
the difference may lie only in the vendor’s description
Next-Generation (NextGen) Firewalls
8
 When evaluating a firewall, ask the following questions:
1. What type of firewall technology offers the right balance
between protection and cost for the needs of the organization?
2. What features are included in the base price? What features are
available at extra cost? Are all cost factors known?
3. How easy is it to set up and configure the firewall? How
accessible are the staff technicians who can competently
configure the firewall?
4. Can the candidate firewall adapt to the growing network in the
target organization?
Selecting the Right Firewall
Intrusion Detection and Prevention
Systems
10
•IDPSs work like burglar alarms and combine tried-and-
true detection methods from intrusion detection systems
(IDSs) with the capability to react to changes in the
environment, which is available in intrusion prevention
technology
Intrusion Detection and Prevention Systems
11
•Systems that include IPS technology attempt to
prevent the attack from succeeding by:
•Stopping the attack by terminating the network
connection or the attacker’s user session
Intrusion Detection and Prevention Systems
(Continued)
12
Intrusion Detection and Prevention Systems
(Continued)
Figure 5-2: Intrusion Detection and Prevention Systems
13
• A host-based IDPS works by configuring and classifying various
categories of systems and data files
• Unless the IDPS is very precisely configured, benign actions can generate
a large volume of false alarms
• Host-based IDPSs can monitor multiple computers simultaneously by
storing a client file on each monitored host and then making that host
report back to the master console, which is usually located on the
system administrator’s computer
Host-Based IDPS
14
• Network-based IDPSs monitor network traffic and, when a predefined
condition occurs, notify the appropriate administrator
• The network-based IDPS looks for patterns of network traffic and must
match known and unknown attack strategies against their knowledge
base to determine whether an attack has occurred
Network-Based IDPS
15
Summary
• A firewall in an InfoSec program is any device that prevents a specific type of
information from moving between the outside world (the untrusted network) and
the inside world (the trusted network)
• Types of firewalls include packet filtering firewalls, application layer proxy firewalls,
stateful packet inspection firewalls, and Unified Threat Management devices.
There are three common architectural implementations of firewalls: single bastion
hosts, screened-host firewalls, and screened-subnet firewalls.
• A host-based IDPS resides on a particular computer or server and monitors activity on that
system. A network-based IDPS monitors network traffic; when a predefined condition occurs,
it responds and notifies the appropriate administrator
16
Thank you

More Related Content

PPT
Firewalls, Types of Firewalls, Advantages
PPTX
firrewall and intrusion prevention system.pptx
PDF
Describe what you would do to protect a network from attack, mention .pdf
PDF
CNIT 140: Perimeter Security
PDF
004_Cybersecurity Fundamentals Network Security.pdf
PDF
The Growing Network Firewall Market_ Trends, Challenges, and Future Outlook.pdf
PPTX
Aca presentation arm_
Firewalls, Types of Firewalls, Advantages
firrewall and intrusion prevention system.pptx
Describe what you would do to protect a network from attack, mention .pdf
CNIT 140: Perimeter Security
004_Cybersecurity Fundamentals Network Security.pdf
The Growing Network Firewall Market_ Trends, Challenges, and Future Outlook.pdf
Aca presentation arm_

Similar to Principles of Cybersecurity Lecture Dr. Muamer (20)

PDF
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
PPT
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
PDF
Module 19 (evading ids, firewalls and honeypots)
PPT
Firewall presentation m. emin özgünsür
PDF
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
PPTX
Endpoint Security - Network Security Infrastructure
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
PDF
UNIT 4 Firewalls Information Security Sharad Institute
PPTX
Securing E-commerce networks in MIS and E-Commerce
PDF
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
DOCX
Intrusion Detection System � A Survey
PDF
Edu 03Anju 23 assignment.pdf
PDF
Introduction to Cyber security module - III
DOCX
Network and web security
PPTX
information security (Audit mechanism, intrusion detection, password manageme...
PDF
How Does a Firewall Protect Against Hackers?
PPTX
Firewalls-Essential-Network-Security.pptx
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
Module 19 (evading ids, firewalls and honeypots)
Firewall presentation m. emin özgünsür
The Ultimate Guide to Network Firewalls_ Everything You Need to Know.pdf
Endpoint Security - Network Security Infrastructure
Intrusion Detection Systems and Intrusion Prevention Systems
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
UNIT 4 Firewalls Information Security Sharad Institute
Securing E-commerce networks in MIS and E-Commerce
FALLSEM2023-24_CSE3501_ETH_VL2023240102981_2023-09-04_Reference-Material-I.pdf
Welcome to International Journal of Engineering Research and Development (IJERD)
Intrusion Detection System � A Survey
Edu 03Anju 23 assignment.pdf
Introduction to Cyber security module - III
Network and web security
information security (Audit mechanism, intrusion detection, password manageme...
How Does a Firewall Protect Against Hackers?
Firewalls-Essential-Network-Security.pptx
Ad

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPT
Ethics in Information System - Management Information System
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Internet Safety for Seniors presentation
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
artificial intelligence overview of it and more
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Funds Management Learning Material for Beg
PPTX
E -tech empowerment technologies PowerPoint
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
newyork.pptxirantrafgshenepalchinachinane
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Ethics in Information System - Management Information System
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
The Evolution of Traditional to New Media .pdf
Internet Safety for Seniors presentation
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
artificial intelligence overview of it and more
Exploring VPS Hosting Trends for SMBs in 2025
Design_with_Watersergyerge45hrbgre4top (1).ppt
Funds Management Learning Material for Beg
E -tech empowerment technologies PowerPoint
simpleintnettestmetiaerl for the simple testint
Uptota Investor Deck - Where Africa Meets Blockchain
Ad

Principles of Cybersecurity Lecture Dr. Muamer

  • 1. 1 Principles of Cyber Security Lecture 05: Managing Network Security Dr. Muamer Mohammed
  • 2. Objectives 5.1 List and discuss the various types of firewalls and the common approaches to firewall implementation. 5.2 Define and describe the types of intrusion detection and prevention systems and the strategies on which they are based
  • 3. 3 Firewalls In InfoSec, a firewall is any device that prevents a specific type of information from moving between the outside world, known as the untrusted network (e.g., the Internet), and the inside world, known as the trusted network
  • 4. 4 Categories of Firewalls The most common types of firewalls are: Packet filtering firewalls Application layer proxy firewalls Stateful packet inspection firewalls Unified Threat Management (UTM) devices
  • 5. 5 Packet Filtering Firewalls Packet filtering firewalls are simple networking devices that filter packets by examining every incoming and outgoing packet header They can selectively filter packets based on values in the packet header, accepting or rejecting packets as needed These devices can be configured to filter based on IP address, type of packet, port request, and/or other elements present in the packet
  • 6. 6 Packet Filtering Firewalls Figure 5-1: Packet Filtering Firewalls
  • 7. 7 •Similar to UTM devices, next-generation firewalls (NextGen or NGFW) combine traditional firewall functions with other network security functions such as deep packet inspection, IDPSs, and the ability to decrypt encrypted traffic •The functions are so similar to those of UTM devices that the difference may lie only in the vendor’s description Next-Generation (NextGen) Firewalls
  • 8. 8  When evaluating a firewall, ask the following questions: 1. What type of firewall technology offers the right balance between protection and cost for the needs of the organization? 2. What features are included in the base price? What features are available at extra cost? Are all cost factors known? 3. How easy is it to set up and configure the firewall? How accessible are the staff technicians who can competently configure the firewall? 4. Can the candidate firewall adapt to the growing network in the target organization? Selecting the Right Firewall
  • 9. Intrusion Detection and Prevention Systems
  • 10. 10 •IDPSs work like burglar alarms and combine tried-and- true detection methods from intrusion detection systems (IDSs) with the capability to react to changes in the environment, which is available in intrusion prevention technology Intrusion Detection and Prevention Systems
  • 11. 11 •Systems that include IPS technology attempt to prevent the attack from succeeding by: •Stopping the attack by terminating the network connection or the attacker’s user session Intrusion Detection and Prevention Systems (Continued)
  • 12. 12 Intrusion Detection and Prevention Systems (Continued) Figure 5-2: Intrusion Detection and Prevention Systems
  • 13. 13 • A host-based IDPS works by configuring and classifying various categories of systems and data files • Unless the IDPS is very precisely configured, benign actions can generate a large volume of false alarms • Host-based IDPSs can monitor multiple computers simultaneously by storing a client file on each monitored host and then making that host report back to the master console, which is usually located on the system administrator’s computer Host-Based IDPS
  • 14. 14 • Network-based IDPSs monitor network traffic and, when a predefined condition occurs, notify the appropriate administrator • The network-based IDPS looks for patterns of network traffic and must match known and unknown attack strategies against their knowledge base to determine whether an attack has occurred Network-Based IDPS
  • 15. 15 Summary • A firewall in an InfoSec program is any device that prevents a specific type of information from moving between the outside world (the untrusted network) and the inside world (the trusted network) • Types of firewalls include packet filtering firewalls, application layer proxy firewalls, stateful packet inspection firewalls, and Unified Threat Management devices. There are three common architectural implementations of firewalls: single bastion hosts, screened-host firewalls, and screened-subnet firewalls. • A host-based IDPS resides on a particular computer or server and monitors activity on that system. A network-based IDPS monitors network traffic; when a predefined condition occurs, it responds and notifies the appropriate administrator