0% found this document useful (0 votes)
25 views19 pages

Firewall

A firewall is a security device that filters network traffic to protect against unauthorized access and cyber threats. It can be hardware, software, or cloud-based, each with its own pros and cons, and operates using various filtering mechanisms like packet filtering and stateful inspection. Firewalls are essential for safeguarding networks from hackers and malware, but they may require additional security measures for comprehensive protection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views19 pages

Firewall

A firewall is a security device that filters network traffic to protect against unauthorized access and cyber threats. It can be hardware, software, or cloud-based, each with its own pros and cons, and operates using various filtering mechanisms like packet filtering and stateful inspection. Firewalls are essential for safeguarding networks from hackers and malware, but they may require additional security measures for comprehensive protection.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

FIREWAL

L
FIREWALL
• A firewall is a security device
— computer hardware or
software — that can help
protect your network by
filtering traffic and blocking
outsiders from gaining
unauthorized access to the
private data on your https://www.hotspotshield.com/imgs/learn/what-is-a-computer-firewall/pic.jpg

computer.
WHAT DOES A FIREWALL DO?

• A firewall acts as a gatekeeper. It


monitors attempts to gain access to your
operating system and blocks unwanted
traffic or unrecognized sources.
HOW DOES A FIREWALL WORK?

• To start, a firewalled system analyzes


network traffic based on rules. A firewall only
welcomes those incoming connections that it
has been configured to accept. It does this
by allowing or blocking specific data packets
— units of communication you send over
digital networks — based on pre-established
security rules.
TYPES OF FIREWALLS
1. Based on Deployment:
• These firewalls are classified based on how
they are implemented in a network.
• a. Hardware Firewall
• A physical device that filters traffic
before it enters a network.
• Often used in businesses, schools,
and large networks.
• 🔹 Pros:
✔ Provides network-wide protection.
✔ Doesn’t consume computer resources.
• 🔹 Cons:
❌ Expensive and requires technical setup.
❌ Less flexible for individual device control.
b. Software Firewall
• Description:
• A firewall installed on a computer or
device to monitor and control traffic.
• Common in personal computers and
small networks.
• Pros:
✔ More customizable for individual users.
✔ Provides protection for a single device.
• 🔹 Cons:
❌ Uses system resources (RAM, CPU).
❌ Needs to be installed on each device
separately.
c. Cloud-Based Firewall (Firewall as a
Service - FWaaS)

•A cloud-hosted firewall that protects networks


remotely.
•Used by organizations with multiple locations or
remote users.
• Pros:
✔ Scalable and easy to update.
✔ No need for physical installation.
• 🔹 Cons:
❌ Requires internet connectivity to
function.
❌ Monthly or yearly subscription fees.
2. Based on Filtering Mechanism:
• These firewalls differ in how they inspect and
filter network traffic.
• a. Packet-Filtering Firewall
• 🔹 How it Works:
• Checks each packet’s header information
(IP address, port number, protocol).
• Allows or blocks packets based on
predefined rules.
• Pros:
✔ Fast and efficient for basic
security.
• 🔹 Cons:
❌ Doesn’t analyze packet content,
which means malware can
bypass it.
• b. Stateful Inspection Firewall
• 🔹 How it Works:
• Tracks the state of active
connections and allows only
legitimate responses.
• More advanced than packet filtering.
• Pros:
✔ More secure than simple packet-
filtering firewalls.
✔ Prevents hackers from spoofing
connections.
• 🔹 Cons:
❌ Requires more computing power,
which slows down performance.
• c. Proxy Firewall (Application Layer
Firewall)
• 🔹 How it Works:
• Acts as an intermediary between users
and the internet.
• Filters requests at the application level
(e.g., only allowing safe websites).
• 🔹 Pros:
✔ Provides stronger filtering by analyzing
full data packets.
✔ Hides user IP addresses for privacy.
• 🔹 Cons:
❌ Slower than other firewalls because it
processes more data.
❌ Some applications may not work properly.
• d. Next-Generation Firewall
(NGFW)
• 🔹 How it Works:
• Combines multiple security features,
including deep packet inspection
(DPI), intrusion prevention, and
antivirus scanning.
• 🔹 Pros:
✔ Most secure option with advanced
filtering.
✔ Protects against modern threats like
malware, phishing, and hacking.
• 🔹 Cons:
❌ Expensive and requires high-
performance hardware.
❌ Complex to configure and manage.
1. ___ A firewall is a security system that monitors and controls incoming and
outgoing network traffic.
2. ___ Firewalls can only be hardware-based.
3. ___ A packet-filtering firewall inspects the contents of a data packet before
deciding to allow or block it.
4. ___ Firewalls help protect networks from hackers, viruses, and unauthorized
access.
5. ___ A proxy firewall acts as an intermediary between users and the internet.
6. ___ Cloud-based firewalls require no internet connection to function.
7. ___ Stateful inspection firewalls track active connections and only allow
legitimate responses.
8. ___ A firewall can prevent all types of cyberattacks without additional security
measures.
9. ___ Software firewalls are installed on individual devices, while hardware
firewalls protect an entire network.
10.___ Next-Generation Firewalls (NGFW) combine multiple security features like
deep packet inspection and intrusion prevention.

You might also like