0% found this document useful (0 votes)
206 views

Network Security Using Firewalls

Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views

Network Security Using Firewalls

Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21

NETWORK SECURITY

USING
FIREWALLS

Submitted By:-
Priyadarsani Behera
Need of Security System
 Activity like Airline Ticketing, Rail way
Reservation, Banking etc. are going on –
line & can perform by inter connected
computer networks.

 Users are give private data.


 Need of a system to keep private data
secured on the network.
 Network security employs certain
hardware and software method to restrict
access to private data which is known as
Firewall.
 Firewall is a combination of hardware and
software that intercepts data between
internet and your computer .
 Firewall must authorize data or people to
pass into the network.
 Implement network access policy that data
are examined & evaluated.
 Establish a security perimeter that locking
both the incoming and outgoing data.
How Do Hackers Get Into Your Pc ?
 Logging on to Internet will assigned a unique
identification number called the Internet protocol
(IP) address by Internet service provider .
 To access the computer, hackers needs to get
IP address and scan computer for any open
ports, program to crack password.
 Security becomes primary concern for
organization to connect private network to
internet.
 Tools used for network security are Firewall,
cryptography, encryption, digital signature and
passwords.
Firewall System
 The firewall system can be a route, a pc, a
host or a collection of hosts setup specially
to shield a site from protocol and service
that can be abused from host outside the
network. It is located at a higher level
gateway such as a site connected to the
Internet.
What A Firewall Should Contain ?
 Support security policy.

 Simple in design, easy to understand and maintain.

 Contain advanced authorization measures.

 Able to accommodate new services.

 Employ filtering technique for services.

 Use proxy service for FTP.

 Able to accommodate public access to certain system on Internet.

 Contain mechanism for logging network traffic.


Firewall Operations

 Firewall implements security rules .

 Gives control over how people use the


network .
What It Protects ?
 Remote login:

Someone connect to your system can’t able to view


or access files that are actually running on computer

 Application backdoors:

Provides a backdoor or hidden access .


Denial of service
 Hackers send a request to the server to
connect to a system .
 The server responds with an
acknowledgement and establish a
session.
 Server with these unanswerable session
request, the hacker causes the server to
slow down or eventually a crash.
E –mail bombs

 Personal attack.

 Someone sends the same E –mail


hundred or thousands of times until your
E –mail system can’t accept any more
messages.
Macros

 Many applications allow to create a script of


command that the application can run.

 This script is known as macro.

 Hackers are create their own macros


depending on the application program which
can destroy your data or rash your computer.
Viruses

 A small program that can copy itself to


other computers.
 Spread itself quickly from one system to
the next system.
 Viruses are producing from harmless
message to erase all of your data.
 Firewall required to install Anti –viruses
software on each computer and protect as
long as accept E –mail.

 Simply block every thing and then begin to


select what type of traffic you will allow .
 Good rule for business and required
experienced network administrator to
understand needs and knows what traffic
to allow .

 Firewall stops anyone outside logging to a


computer in your private network .
How Firewall Works ?
 Widely used Technique is Application –level
firewalls .

 Special –purpose code is installed on the


gateway for each application .

 A small program specifically designed for


network security is known as proxy service.
 Users are permitted access to proxy service but
never permitted to log on into the Application –
level gateway.

 Application –level gateway allow information to


flow between systems but don’t allowed direct
exchange of packets.

 Application –level gateway is referred as a


“bastion host”
i de r
S e
In erv
y S
ewa
t
l ga
e
ev
–l
n
tio
a P
ic
ppl FT
A x y
P ro

n et
l
Te
o xy
Pr

ut e
O id t
S lien
C
 The outside client wants to connect to
inside server protected by Application –
level gateway.
 Telnet proxy never allows remote user to
log or have direct access to internal
server.
 The outside client, Telnets to the bastion
host, which authorization the user.
 After user authorization the outside client
access the user interface of the Telnet
proxy.
 The outside user specifies the destination
host.
 Telnet proxy makes its connection inside
server and forwards commands to inside
server on behalf of outside client.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy