IAS Chapter 3 Edited
IAS Chapter 3 Edited
IAS Chapter 3 Edited
• Protocols: a set of rules and guidelines for communicating data. Rules are defined for each
step and process during communication between two or more computers.
• Firewalls :is a network security device/software that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established security policies
Basic Firewall Components
• Policy
• Advanced authentication
• Packet inspection
• Application gateways
Who do Firewalls Guard Against?
• Internal Users
• Hackers
• Corporate Espionage
• Terrorists
• Common Thieves
Firewall
The purpose of a firewall is to block traffic from the outside, but it could also
be used to block traffic from the inside based on a defined set of security rules.
• They can distinguish different programs running on the host, while filtering
inbound and outbound traffic.
Design goals:
Blocking access except via the firewall: All traffic from inside to outside must
pass through the firewall (physically blocking all access to the local network
except via the firewall).
Defined the local security police: Only authorized traffic will be allowed to pass.
Techniques that use to control access and enforce the site's security policy are
Service control
Determines the type of internet services that can be accessed, inbound
or outbound.
The firewall may filter traffic on this basis of IP address and TCP port number;
may provide proxy software that receives and interprets each service request
before passing it on; or may host the server software itself, such as web or
mail service.
Firewall Techniques Cont..
Direction control
Determines the direction in which particular service request may be initiated
User control
Controls access to a service according to which user is attempting to access it.
Behavior control
Controls how particular services are used (e.g. filter e-mail)
Policy Actions
Policies used by the firewall to handle packets are based on several properties of
the packets being inspected, including the protocol used, such as:
TCP or UDP
• The firewall does not protect against internal threats, such as a disgruntled
employee or an employee who unwittingly cooperates with an external attacker.
• The firewall cannot protect against attacks that bypass the firewall. Internal
systems may have dial-out capability to connect to an ISP.
Types of Firewalls
• It also called proxies, are similar to circuit-level gateways except that they are
application specific.
• Gateway that is configured to be a web proxy will not allow any ftp, telnet or
other traffic through.
• It may inspect the contents of the traffic, blocking what it views as inappropriate
content (i.e. websites, viruses, vulnerabilities, ...)
Application Level
State full Multilayer
• They filter packets at the network layer, determine whether session packets are
legitimate and evaluate contents of packets at the application layer.
Thank You!!!