SlideShare uma empresa Scribd logo
1 de 29
CREATED BY BHUSHAN D LOKHANDE
Firewall is a network security device, either hardware or software
based, which monitors all incoming and outgoing traffic and based on
defined set of security rules it accept, reject or drop that specific traffic.
• Accept : allow the traffic.
• Reject : block the traffic but reply with an “unreachable error”.
• Drop : block the traffic with no reply.
Firewall establishes a barrier between secured internal networks
and outside untrusted network, such as Internet.
Connectivity to the Internet is no longer optional for
organizations. However, accessing Internet provides benefits to the
organization; it also enables the outside world to interact with internal
network of the organization.
 Firewall match the network traffic against the rule set
defined in its table. Once the rule is matched, associate
action is applied to the network traffic.
 Code server and at the same time other rule is defined like
system administrator can access the data from both HR and
technical department. Rules can be defined on firewall
based on the necessity and security policies of organization.
From the perspective of a server, network traffic can be
either outgoing or incoming. Firewall maintains distinct set
of rules for both the cases.
 Mostly the outgoing traffic, originated from the server itself,
allowed to pass. Still, setting rule on outgoing traffic is always
better in order to achieve more security and prevent unwanted
communication.
Default policy: -
It is very difficult to explicitly cover every possible rule on
firewall. For this reason, firewall must always have a default policy.
Default policy only consist action (accept, reject or drop). Suppose
no rule is defined about SSH connection to the server on firewall. So,
it will follow default policy.
• First generation: packet filter:-
The first reported type of network firewall is called a packet filter.
 Packet filters look at network addresses and ports of packets to determine if
they must be allowed, dropped, or rejected.
The first paper published on firewall technology was in 1988, when
engineers from Digital Equipment Corporation (DEC) developed filter
systems known as packet filter firewalls.
At AT&T Bell Labs, Bill Cheswick and Steve Bellovin continued their research
in packet filtering and developed a working model for their own company
based on their original first generation architecture.
• Second generation: Stateful filters:-
From 1989–1990 three colleagues from AT&T Bell Laboratories, Dave
Presotto, Janardan Sharma, and Kshitij Nigam, developed the second
generation of firewalls, calling them circuit-level gateways.
Second-generation firewalls perform the work of their first-generation
predecessors but operate up to layer 4 (transport layer) of the OSI model.
• Third generation: application layer :-
 Marcus Ranum, Wei Xu, and Peter Churchyard developed an application
firewall known as Firewall Toolkit (FWTK).
 In June 1994, Wei Xu extended the FWTK with the kernel enhancement of IP
filter and socket transparent.
 Gauntlet firewall was rated one of the top firewalls during 1995–1998.
 As of 2012, the so-called next-generation firewall (NGFW) is nothing more
than the "wider" or "deeper" inspection at the application layer.
1. Packet Filtering Firewall :-
 A packet filtering firewall applies a set of rules to each incoming and
outgoing IP packet and then forwards or discards the packet.
 The firewall is typically configured to filter packets going in both directions.
 Filtering rules are based on information contained in a network packet:
• Source IP address
• Destination IP address
• Source and destination transport-level address
• IP protocol field
 attacks that can be made on packet filtering firewalls and the appropriate
countermeasures are the following:
 IP address spoofing
 Source routing attacks
 Tiny fragment attacks
2. Stateful Inspection Firewalls :-
 Stateful inspection, also known as dynamic packet filtering, is a
firewall technology that monitors the state of active connections and
uses this information to determine which network packets to allow
through the firewall.
 Stateful inspection has largely replaced an older technology, static
packet filtering.
 They examine each IP packet in context
 Keep track of client-server sessions
 Check each packet validly belongs to one
 Hence are better able to detect bogus packets out of context
3. Application-Level Gateway :-
 An application-level gateway, also called an application proxy, acts
as a relay of application-level traffic.
 Has full access to protocol
 User requests service from proxy
 Proxy validates request as legal
 Then actions request and returns result to user
 It scan HTTP,FTP ,TELNET and SMTP.
4 .Circuit-Level Gateway :-
 Relays two TCP connections are established.
 Imposes security by limiting which such connections are allowed.
 Once created usually relays traffic without examining contents.
 Typically used when trust internal users by allowing general
outbound connections.
 SOCKS commonly used for this firewall.
Advantages of firewall :-
 Reliability:-
 Firewall is more reliable.
 Physical appliances are vulnerable to a life cycle, and will grow to become obsolete
eventually.
 Firewall allows for constant provision, with no need for a physical applies.
 Simplicity :-
 Firewall makes things much simpler to understand and implement; you subscribe to a
firewall service the same way you might subscribe to a CRM or cloud storage provider.
 External Authority :-
 Enlisting the help of Firewall is also a way to delegate the authority of firewall
maintenance to an external expert.
 Remote Coverage:-
 It can be deployed to remote locations without any interruptions from your desired
protocols, and you can rest assured you’ll get the same protection at each area.
 Cost-Effectiveness:-
 Firewall is often more cost-effective than a traditional firewall.
 Providers usually offer different levels of protection and coverage, based on
your needs, but almost any package is going to be cheaper than trying to
manage everything yourself.
 Dis-Advantages of firewall :-
 Diminished Performance:-
 Software-based firewalls have the added inconvenience of inhibiting your computer's
overall performance.
 Software firewalls are constantly running and use processor power and RAM memory to
perform their function.
 Vulnerabilities:-
 firewalls only serve as a perimeter to block unauthorized data transmissions.
 they don't provide anti-virus, anti-malware or anti-spyware capabilities.
 need additional protection if this harmful software is accidentally introduced into the
system through trusted channels like email.
 Internal Attack:-
 Firewalls can be useful in repelling intrusions, but they offer no protection
against sabotage.
Most firewalls have been somewhat hand-built by site
administrators, however the time and effort that could go into
constructing a firewall may outweigh the cost of a vendor solution.
William Cheswick:-
o Cheswick joined Systems and Computer Technology Corporation,he served
as a Systems Programmer and Consultant between 1978 and 1987.
o Cheswick joined Bell Labs in 1987.
o he and Steven M. Bellovin created one of the world's first network firewalls.
o Publication of the seminal book Firewalls and Internet Security .
o Cheswick and Bellovin also created one of the world's first honeypots in the
course of detecting and trapping .
Aviel David Rubin:-
o Rubin is a professor of computer science at Hopkins and technical director of
the JHU Information Security Institute.
o He also founded Harbor Labs-provides technical expertise and testimony in
high tech litigation.
o at & T Labs- Research in the area of cryptography, network security Web
security and secure Internet services
 David Pensak claims to have built the first commercially successful firewall.
 William Cheswick and Steven Bellovin, who literally wrote the book on
firewalls in 1994 while at AT&T Bell Labs.
 Jeff Mogul, Paul Vixie, Brian Reid, Fred Avolio, and Brent Chapman, and others
were associated in some way with the roots of firewall technology(Several of
them have been called the father of the firewall).
 Marcus Ranum was the father of the first firewall 'product' DEC SEAL, the open
source [firewall], and the TIS Gauntlet.
 David Presotto and his colleagues added the stateful inspection concept.
 Nir Zuk was the father of the stateful firewall product .
 DEC SEAL, which was shipped in 1992, was the first commercial firewall and
included proxies developed by Ranum.
Firewall Protects Computer From Unauthorized Remote Access:-
 One of the worst things that could happen to your computer is if someone
attempts to take control remotely.
 Thus preventing hackers from taking over your computer.
 This does not block the remote control apps used by the Windows tech
support scammers.
 Windows found on the Bit torrent networks often come with malware
preinstalled in the disk image.
 firewalls block access by apps perhaps software that you trust from
unauthorized Internet access.
Firewalls Can Block Messages Linking to Unwanted Content
Firewalls Make Online Gaming Safer :-
Firewalls Make Online Gaming Safer :-
 Online gaming is one of the most significant developments in the history of video
games, but it is also a potential security risk.
 Any attempts by hackers to use their malware to get into your system will be
blocked, leaving your system secure.
 Console gamers can take advantage of hardware firewalls or routers if there is a
requirement to edit settings.
You Can Block Unsuitable or Immoral Content With a Firewall :-
 protecting personal directories from ransomware, firewall applications might also
feature the option to block particular online locations.
 find that content filtering comes with some domestic security suites , usually in
close proximity to the firewall.
Firewalls Can Be Hardware or Software :-
 firewalls don’t necessarily have to be software.
 Determines the types of Internet services that can be accessed, inbound or
outbound.
 The firewall may filter traffic on the basis of IP address, protocol, or port number
 Direction control: Determines the direction in which particular service
requests may be initiated and allowed to flow through the firewall.
 User control: Controls access to a service according to which user is
attempting to access it. This feature is typically applied to users inside the
firewall perimeter (local users).
The following capabilities are within the scope of a firewall:-
 A firewall defines a single choke point that keeps unauthorized users out of
the protected network.
 Prohibits potentially vulnerable services from entering.
 Provides a location for monitoring security-related events.
 Convenient platform for several Internet functions that are not security
related.
 The firewall can be used to implement virtual private networks.
 Audits and alarms can be implemented on the firewall system.
 A firewall can serve as the platform for Ipsec.
Data Collection:- For this study we have collected both primary data as
well as secondary data.
Primary Data :-As it is important for any research related field work
that the literature review of the same topic is essential and has to be
done carefully as it fills the voids and answers the researcher’s common
questions.
we did the literature review of Firewall Security topic that is
discussed specifically in the separate section .
We also referred to the published books which are related to the “Firewall
Security”.
The main data is collected through the questionnaires as it can be carried
out by the researcher or by any number of people with limited affect to its
validity and reliability. We asked total 14 Questions to the students and
people of society which led us to some findings and the conclusions.
Secondary Data :-Secondary Data for the research topic is mainly
collected from internet.
We also referred to some research journals which are already
published specifically which are open source for the other researchers
for the on-going research.
Objectives:- The major objectives of this are to Study of Computers
Security Today’s Need:-
To introduce and awareness of Firewall and why it’s necessary in
today’s life.
To find out Advantages &Disadvantages of Firewall And Security
Device.
Methods:-
Sample Procedure:-The survey was conducted by individually Person
meet .Sample size of persons is 25. The survey response rate was
Normal , with 60-70 % of student and people are participating.
• Knowing about firewall
• Better security Option
How many people know Firewall ?
Know Don’t Know
30%
70
98%
2%
Opinion of the Peoples
Yes No
• Budget spent on security Items
• Rate to firewall
7%
37%
30%
26%
A huge amount Quite a lot Not much I don’t know
2%
22%
75%
1%
Rate
Good very Good Excellent Not good at all
Awareness about firewall security
I observe in this survey most of the peoples(nearly 60% to
70% people) not aware about security of firewall and also be the
working of firewall and How to apply Firewall protection .
It is observed from the analysis of awareness about Firewall
security that software firewall are more popular which is provided by
Some antiviruses . Can Hardware Firewall is found to be less popular
among the sampled respondents. Regarding the source of
information about Firewall we oberve hardware based firewall mostly
used in only organizations to protect our LAN Network,connected
computers blocking somesites which is access from in network
computers. Organizations and people used firewall for creat Virtual
Private Network(VPN) .
In conclusion, the Internet has become a dangerous place.
Thirteen-year-old kids on dial-up accounts can crash a site supported
by two T-1 connections by using hundreds of zombies (PCs
hacked and uploaded with a Trojan) to flood with UDP and ICMP
traffic. This is simply a malicious attack meant to consume all of
the bandwidth of a connection to the Internet.
The resulting storm of packets consumes all bandwidth and
disconnects or makes the site unusable for normal traffic. Hackers
attack networks to destroy and/or steal information.
No one should be on the Internet without a firewall. All
networks are protected by firewalls. However, it is always a trade-off.
The whole point of the Internet is communication and exchange of
information.
It is clear that more needs to be done in terms of education
and understanding of the advantages that firewall security
automation brings to the business efficiency table and how it allows
the right set of organizational processes between the relevant
stakeholders to be defined and implemented.
• William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003).
"Google Books Link". Firewalls and Internet Security: repelling the
wily hacker.
• "VPNs and Firewalls". technet.microsoft.com.
• "What is a VPN Firewall? – Definition from
Techopedia". Techopedia.com.
• Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey
of Network Firewalls" (PDF).
Websites
https://en.wikipedia.org/wiki/Firewall_(computing)
https://www.veracode.com/security/firewall-security
https://en.wikipedia.org/wiki/Firewall_(computing)
https://www.scribd.com/doc/22594454/ADVANTAGES-OF-
FIREWALL
https://www.techwalla.com/articles/what-are-the-advantages-and-
disadvantages-of-using-a-firewall
https://kb.iu.edu/d/aoru
http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf
http://www.ijsrp.org/research-paper-0416/ijsrp-p5278.pdf
https://searchsecurity.techtarget.com/definition/firewall
Thank You

Mais conteúdo relacionado

Semelhante a Firewall ppt.pptx

Firewall
FirewallFirewall
Firewall
Apo
 

Semelhante a Firewall ppt.pptx (20)

Note8
Note8Note8
Note8
 
Firewall
FirewallFirewall
Firewall
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Seminar
SeminarSeminar
Seminar
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
Firewall
FirewallFirewall
Firewall
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Firewall ppt.pptx

  • 1. CREATED BY BHUSHAN D LOKHANDE
  • 2. Firewall is a network security device, either hardware or software based, which monitors all incoming and outgoing traffic and based on defined set of security rules it accept, reject or drop that specific traffic. • Accept : allow the traffic. • Reject : block the traffic but reply with an “unreachable error”. • Drop : block the traffic with no reply. Firewall establishes a barrier between secured internal networks and outside untrusted network, such as Internet. Connectivity to the Internet is no longer optional for organizations. However, accessing Internet provides benefits to the organization; it also enables the outside world to interact with internal network of the organization.
  • 3.  Firewall match the network traffic against the rule set defined in its table. Once the rule is matched, associate action is applied to the network traffic.  Code server and at the same time other rule is defined like system administrator can access the data from both HR and technical department. Rules can be defined on firewall based on the necessity and security policies of organization. From the perspective of a server, network traffic can be either outgoing or incoming. Firewall maintains distinct set of rules for both the cases.
  • 4.  Mostly the outgoing traffic, originated from the server itself, allowed to pass. Still, setting rule on outgoing traffic is always better in order to achieve more security and prevent unwanted communication. Default policy: - It is very difficult to explicitly cover every possible rule on firewall. For this reason, firewall must always have a default policy. Default policy only consist action (accept, reject or drop). Suppose no rule is defined about SSH connection to the server on firewall. So, it will follow default policy.
  • 5. • First generation: packet filter:- The first reported type of network firewall is called a packet filter.  Packet filters look at network addresses and ports of packets to determine if they must be allowed, dropped, or rejected. The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin continued their research in packet filtering and developed a working model for their own company based on their original first generation architecture.
  • 6. • Second generation: Stateful filters:- From 1989–1990 three colleagues from AT&T Bell Laboratories, Dave Presotto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling them circuit-level gateways. Second-generation firewalls perform the work of their first-generation predecessors but operate up to layer 4 (transport layer) of the OSI model. • Third generation: application layer :-  Marcus Ranum, Wei Xu, and Peter Churchyard developed an application firewall known as Firewall Toolkit (FWTK).  In June 1994, Wei Xu extended the FWTK with the kernel enhancement of IP filter and socket transparent.  Gauntlet firewall was rated one of the top firewalls during 1995–1998.  As of 2012, the so-called next-generation firewall (NGFW) is nothing more than the "wider" or "deeper" inspection at the application layer.
  • 7. 1. Packet Filtering Firewall :-  A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.  The firewall is typically configured to filter packets going in both directions.  Filtering rules are based on information contained in a network packet: • Source IP address • Destination IP address • Source and destination transport-level address • IP protocol field  attacks that can be made on packet filtering firewalls and the appropriate countermeasures are the following:  IP address spoofing  Source routing attacks  Tiny fragment attacks
  • 8. 2. Stateful Inspection Firewalls :-  Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.  Stateful inspection has largely replaced an older technology, static packet filtering.  They examine each IP packet in context  Keep track of client-server sessions  Check each packet validly belongs to one  Hence are better able to detect bogus packets out of context 3. Application-Level Gateway :-  An application-level gateway, also called an application proxy, acts as a relay of application-level traffic.
  • 9.  Has full access to protocol  User requests service from proxy  Proxy validates request as legal  Then actions request and returns result to user  It scan HTTP,FTP ,TELNET and SMTP. 4 .Circuit-Level Gateway :-  Relays two TCP connections are established.  Imposes security by limiting which such connections are allowed.  Once created usually relays traffic without examining contents.  Typically used when trust internal users by allowing general outbound connections.  SOCKS commonly used for this firewall.
  • 10. Advantages of firewall :-  Reliability:-  Firewall is more reliable.  Physical appliances are vulnerable to a life cycle, and will grow to become obsolete eventually.  Firewall allows for constant provision, with no need for a physical applies.  Simplicity :-  Firewall makes things much simpler to understand and implement; you subscribe to a firewall service the same way you might subscribe to a CRM or cloud storage provider.  External Authority :-  Enlisting the help of Firewall is also a way to delegate the authority of firewall maintenance to an external expert.  Remote Coverage:-  It can be deployed to remote locations without any interruptions from your desired protocols, and you can rest assured you’ll get the same protection at each area.
  • 11.  Cost-Effectiveness:-  Firewall is often more cost-effective than a traditional firewall.  Providers usually offer different levels of protection and coverage, based on your needs, but almost any package is going to be cheaper than trying to manage everything yourself.  Dis-Advantages of firewall :-  Diminished Performance:-  Software-based firewalls have the added inconvenience of inhibiting your computer's overall performance.  Software firewalls are constantly running and use processor power and RAM memory to perform their function.  Vulnerabilities:-  firewalls only serve as a perimeter to block unauthorized data transmissions.  they don't provide anti-virus, anti-malware or anti-spyware capabilities.  need additional protection if this harmful software is accidentally introduced into the system through trusted channels like email.
  • 12.  Internal Attack:-  Firewalls can be useful in repelling intrusions, but they offer no protection against sabotage. Most firewalls have been somewhat hand-built by site administrators, however the time and effort that could go into constructing a firewall may outweigh the cost of a vendor solution.
  • 13. William Cheswick:- o Cheswick joined Systems and Computer Technology Corporation,he served as a Systems Programmer and Consultant between 1978 and 1987. o Cheswick joined Bell Labs in 1987. o he and Steven M. Bellovin created one of the world's first network firewalls. o Publication of the seminal book Firewalls and Internet Security . o Cheswick and Bellovin also created one of the world's first honeypots in the course of detecting and trapping . Aviel David Rubin:- o Rubin is a professor of computer science at Hopkins and technical director of the JHU Information Security Institute. o He also founded Harbor Labs-provides technical expertise and testimony in high tech litigation.
  • 14. o at & T Labs- Research in the area of cryptography, network security Web security and secure Internet services  David Pensak claims to have built the first commercially successful firewall.  William Cheswick and Steven Bellovin, who literally wrote the book on firewalls in 1994 while at AT&T Bell Labs.  Jeff Mogul, Paul Vixie, Brian Reid, Fred Avolio, and Brent Chapman, and others were associated in some way with the roots of firewall technology(Several of them have been called the father of the firewall).  Marcus Ranum was the father of the first firewall 'product' DEC SEAL, the open source [firewall], and the TIS Gauntlet.  David Presotto and his colleagues added the stateful inspection concept.  Nir Zuk was the father of the stateful firewall product .  DEC SEAL, which was shipped in 1992, was the first commercial firewall and included proxies developed by Ranum.
  • 15. Firewall Protects Computer From Unauthorized Remote Access:-  One of the worst things that could happen to your computer is if someone attempts to take control remotely.  Thus preventing hackers from taking over your computer.  This does not block the remote control apps used by the Windows tech support scammers.  Windows found on the Bit torrent networks often come with malware preinstalled in the disk image.  firewalls block access by apps perhaps software that you trust from unauthorized Internet access. Firewalls Can Block Messages Linking to Unwanted Content Firewalls Make Online Gaming Safer :-
  • 16. Firewalls Make Online Gaming Safer :-  Online gaming is one of the most significant developments in the history of video games, but it is also a potential security risk.  Any attempts by hackers to use their malware to get into your system will be blocked, leaving your system secure.  Console gamers can take advantage of hardware firewalls or routers if there is a requirement to edit settings. You Can Block Unsuitable or Immoral Content With a Firewall :-  protecting personal directories from ransomware, firewall applications might also feature the option to block particular online locations.  find that content filtering comes with some domestic security suites , usually in close proximity to the firewall. Firewalls Can Be Hardware or Software :-  firewalls don’t necessarily have to be software.  Determines the types of Internet services that can be accessed, inbound or outbound.  The firewall may filter traffic on the basis of IP address, protocol, or port number
  • 17.  Direction control: Determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.  User control: Controls access to a service according to which user is attempting to access it. This feature is typically applied to users inside the firewall perimeter (local users). The following capabilities are within the scope of a firewall:-  A firewall defines a single choke point that keeps unauthorized users out of the protected network.  Prohibits potentially vulnerable services from entering.  Provides a location for monitoring security-related events.  Convenient platform for several Internet functions that are not security related.  The firewall can be used to implement virtual private networks.  Audits and alarms can be implemented on the firewall system.  A firewall can serve as the platform for Ipsec.
  • 18. Data Collection:- For this study we have collected both primary data as well as secondary data. Primary Data :-As it is important for any research related field work that the literature review of the same topic is essential and has to be done carefully as it fills the voids and answers the researcher’s common questions. we did the literature review of Firewall Security topic that is discussed specifically in the separate section . We also referred to the published books which are related to the “Firewall Security”. The main data is collected through the questionnaires as it can be carried out by the researcher or by any number of people with limited affect to its validity and reliability. We asked total 14 Questions to the students and people of society which led us to some findings and the conclusions.
  • 19. Secondary Data :-Secondary Data for the research topic is mainly collected from internet. We also referred to some research journals which are already published specifically which are open source for the other researchers for the on-going research. Objectives:- The major objectives of this are to Study of Computers Security Today’s Need:- To introduce and awareness of Firewall and why it’s necessary in today’s life. To find out Advantages &Disadvantages of Firewall And Security Device. Methods:- Sample Procedure:-The survey was conducted by individually Person meet .Sample size of persons is 25. The survey response rate was Normal , with 60-70 % of student and people are participating.
  • 20. • Knowing about firewall • Better security Option How many people know Firewall ? Know Don’t Know 30% 70 98% 2% Opinion of the Peoples Yes No
  • 21. • Budget spent on security Items • Rate to firewall 7% 37% 30% 26% A huge amount Quite a lot Not much I don’t know 2% 22% 75% 1% Rate Good very Good Excellent Not good at all
  • 22.
  • 23.
  • 24. Awareness about firewall security I observe in this survey most of the peoples(nearly 60% to 70% people) not aware about security of firewall and also be the working of firewall and How to apply Firewall protection . It is observed from the analysis of awareness about Firewall security that software firewall are more popular which is provided by Some antiviruses . Can Hardware Firewall is found to be less popular among the sampled respondents. Regarding the source of information about Firewall we oberve hardware based firewall mostly used in only organizations to protect our LAN Network,connected computers blocking somesites which is access from in network computers. Organizations and people used firewall for creat Virtual Private Network(VPN) .
  • 25. In conclusion, the Internet has become a dangerous place. Thirteen-year-old kids on dial-up accounts can crash a site supported by two T-1 connections by using hundreds of zombies (PCs hacked and uploaded with a Trojan) to flood with UDP and ICMP traffic. This is simply a malicious attack meant to consume all of the bandwidth of a connection to the Internet. The resulting storm of packets consumes all bandwidth and disconnects or makes the site unusable for normal traffic. Hackers attack networks to destroy and/or steal information. No one should be on the Internet without a firewall. All networks are protected by firewalls. However, it is always a trade-off. The whole point of the Internet is communication and exchange of information.
  • 26. It is clear that more needs to be done in terms of education and understanding of the advantages that firewall security automation brings to the business efficiency table and how it allows the right set of organizational processes between the relevant stakeholders to be defined and implemented.
  • 27. • William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003). "Google Books Link". Firewalls and Internet Security: repelling the wily hacker. • "VPNs and Firewalls". technet.microsoft.com. • "What is a VPN Firewall? – Definition from Techopedia". Techopedia.com. • Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (PDF). Websites https://en.wikipedia.org/wiki/Firewall_(computing)