Firewalls and Network Security
Firewalls and Network Security
and
Network Security
By: W.K.Hiruni Ayodya
Final Year Undergraduate
University of Moratuwa
Contents 1. Principles of Security
2. Security Concepts
3. Common Attacks
4. Security Measures
5. Firewall
6. Firewall Comparison
1. Principles of Security
The CIA Triad is a fundamental concept in information security governing the security of
information and information systems.
CONFIDENTIALITY
Ensuring that information is only accessible to
authorized users.
INTEGRITY
Maintaining the accuracy and trustworthiness of data by
preventing unauthorized alterations.
AVAILABILITY
Ensuring that systems and data are accessible when
needed.
2. Security Concepts
A weakness which The mechanism to The potential of The potential for Strategies to
can be exploited by take advantage of a vulnerability to be damage when a minimize or
an attacker in its vulnerability, to exploited. threat exploits a eliminate the impact
benefit. compromise the vulnerability. of threats.
functionality of a Ex: Virus, Trojan,
Ex: SW bugs & system. Malware & Phishing Ex: Data Breach Ex: Regular
weak updates, robust
passwords Ex: Malicious code firewalls
Threats
Reflection/Amplification
Man-in-the-middle Attack
Attack
Management Managed on a per-device basis Centralized management for the entire network
Types of Firewalls
Firewall Types - Operational Method
Method of Operation: Filtering rules are based on information contained in a network packet.
Source IP address
Destination IP address
Source and destination transport level address
IP protocol field
Interface
Packet Filtering Firewalls
ADVANTAGES DISADVANTAGES
Single device can filter traffic for the entire Lacks broader context for filtering
network
Doesn't check payload and easily spoofed
Extremely fast and efficient in scanning
Not ideal for every network
traffic
ACLs can be difficult to set up and manage
Inexpensive
ADVANTAGES DISADVANTAGES
Low cost and minimal impact on end-user Requires ongoing updates to keep rules
experience current
Application level Gateway Firewalls
Also referred to as a "proxy firewall”.
Layer of Operation: Operates at the application layer.
Method of Operation: Employ deep packet inspection for comprehensive content and header
analysis.
Monitors TCP handshakes to determine session legitimacy between trusted clients or servers to
untrusted hosts and vice versa.
Follows application-specific policies to control communications, enhancing network protection.
Application level Gateway Firewalls
ADVANTAGES DISADVANTAGES
ADVANTAGES DISADVANTAGES
Monitors entire session for connection Resource-intensive and may interfere with
state, IP, and payloads network speed
Offers high control over content filtering More expensive than some options
Doesn't require numerous open ports Doesn't provide authentication for traffic
source validation
Next Generation Firewall (NGFW)
Advanced network security solutions that combine traditional firewall capabilities with
additional features for enhanced threat detection and prevention.
Next Generation Firewall (NGFW)
ADVANTAGES DISADVANTAGES
Combines DPI with malware filtering and Requires integration with other security
other controls systems for maximum benefit
Tracks traffic from Layer 2 to the Costlier than other firewall types
application layer
TCP Handshake
No Yes Yes Yes Yes
Monitoring
No (Doesn't filter Yes (Deep packet Yes (Deep packet Yes (Deep packet
Content Inspection Limited (Headers)
content) inspection) inspection) inspection)
Performance Impact Low Low Moderate to High Moderate to High Moderate to High