Network Security Firewall(Basics of Firewall)

sivaraman163206 67 views 5 slides Jul 28, 2024
Slide 1
Slide 1 of 5
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5

About This Presentation

A basic understanding on firewall is discussed here.


Slide Content

Unit 3 - Network Security Firewall Overview of Firewall Types and Network Security L R SIVA RAMAN ASSISTANT PROFESSOR PG & RESEARCH DEPARTMENT OF INTERNATIONAL BUSINESS Sri Ramakrishna college of arts & science

Understanding Firewalls Definition: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Purpose: Establishes a barrier between a trusted internal network and untrusted external networks, such as the Internet. Types: Hardware, Software, or Both

Different Types of Firewalls Proxy Firewall: Acts as a gateway from one network to another for specific applications. Provides additional functionalities such as content caching and security. May impact throughput capabilities. Stateful Inspection Firewall: Monitors the state, port, and protocol of traffic. Makes filtering decisions based on administrator-defined rules and context from previous connections.

Advanced Firewall Technologies Unified Threat Management (UTM) Firewall: Combines stateful inspection, intrusion prevention, and antivirus capabilities. Focuses on simplicity and ease of use. Next-Generation Firewall (NGFW): Blocks modern threats such as advanced malware and application-layer attacks. Includes standard firewall capabilities, integrated intrusion prevention, application awareness, and techniques for evolving security threats.

Importance of Network Security Complexity in Network Environments: Ensuring controlled access to the network. Protecting data during transmission across the network. Client-Server Security: Uses various authorization methods to ensure only valid users and programs access information resources. Data and Transaction Security: Ensures privacy and confidentiality in electronic messages and data packets. Prevents identity assumption during electronic communications.
Tags