6
Most read
8
Most read
12
Most read
Firewall Security Definition
Firewall protection is the one that controls and monitors the
network traffic whether it is incoming or outgoing on
predetermined rules of security.
Simply saying
It is basically a barrier or a shield applied specifically to
save your PC, phone or tablet from the malwares of
external world that exist in abundance on the internet.
A barrier against malwares
Functioning in simple words
It is either a piece of hardware or a software program that
helps to keep the hackers, viruses, and worms to stay away
from your computer. Simply speaking it screens out all the
malicious activities from our network.
Advantages
• Packet filter is used to inspect the header of the packet to know
its destination and where it came from.
• All this info is equated to judge whether the packet should be
allowed or intercepted.
• Specific ports are used by the next Generation firewalls, which
designed to filter the network and traffic based on internet.
• Proxy firewall security enables protocol aware logging. This
makes easy to identify any attack.
• A backup of logs is also gained by using this that exist on the
servers that are protected by the proxy.
• Installed properly at a proper time saves the company or even
a person a huge sum of money.
Disadvantages
• The main function of firewalls is the restriction to a network.
This can also block the legitimate users.
• The blockage of legitimate employees to access the network of
the company can also lead to low productivity levels.
• Usually, these blockages are applied using strict policies so the
employees might use the backdoor methods for accessing the
network.
• Also firewalls don’t protect against the internal wreckage and
damage,
• Which allows the unethical employees to take advantage of the
weak points in the network.
• Hardware firewalls are normally more expensive and need
specialized staff to maintain, install and monitor the operations.
Types of attacks against which
networks are protected
• IP spoofing attacks
• Denial of service attacks (DoS attacks)
• Man in the middle attack
• Firewall security is also essential in sniffer attack
Firewall based on circuit level gateways
advantages
• Performance of network is not affected of affected very less.
• The direct connection between the trusted client and the
untrusted host is terminated
• It possess much high level of security as compared to packet filter
firewalls
Special Thanks
For being with us

More Related Content

PPTX
Firewall
PPTX
Firewall presentation
PPTX
Firewall and its purpose
PDF
FIREWALL
PPT
PPT
Firewall Architecture
PPTX
Firewall
Firewall presentation
Firewall and its purpose
FIREWALL
Firewall Architecture

What's hot (20)

PPTX
Firewall security in computer network
PPTX
Firewall presentation
PPTX
Network security
PPTX
Firewall ( Cyber Security)
PPTX
Introduction of firewall slides
PPTX
Assignment on windows firewall
PPT
Firewall protection
PPT
Network Security
PDF
Network Security Presentation
PPTX
Types of firewall
PPT
Firewall
PPTX
Firewall and Types of firewall
PPTX
PPTX
Network security
PPT
FireWall
PPTX
Network Security
PPTX
User authentication
 
PPTX
Types Of Firewall Security
PPTX
Networking Devices
Firewall security in computer network
Firewall presentation
Network security
Firewall ( Cyber Security)
Introduction of firewall slides
Assignment on windows firewall
Firewall protection
Network Security
Network Security Presentation
Types of firewall
Firewall
Firewall and Types of firewall
Network security
FireWall
Network Security
User authentication
 
Types Of Firewall Security
Networking Devices
Ad

Similar to Firewall Security Definition (20)

PPTX
edu03firewall,Antivirus software.pptx
PPTX
Firewalls
PPTX
13-MohamedHany -6666-date-2025 5 12.pptx
PPTX
Firewall
PPT
Firewall Management: What Is It?
PPTX
firewall as a security measure (1)-1.pptx
PPTX
U-2.pptx............................................
PPTX
FIREWALLS.pptx
PPT
firewall.ppt
PPT
chap7-Firewall.ppt
PPTX
Firewall ppt
PPTX
201302057 lakshay it.pptx
PDF
Firewall.pdf
PPTX
Firewall
PDF
Network firewall function & benefits
PPTX
Firewall ppt
PPTX
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
PPTX
Introduction-to-the- inside -Firewall.pptx
PDF
Firewall
PDF
Importance of Using Firewall for Threat Protection
edu03firewall,Antivirus software.pptx
Firewalls
13-MohamedHany -6666-date-2025 5 12.pptx
Firewall
Firewall Management: What Is It?
firewall as a security measure (1)-1.pptx
U-2.pptx............................................
FIREWALLS.pptx
firewall.ppt
chap7-Firewall.ppt
Firewall ppt
201302057 lakshay it.pptx
Firewall.pdf
Firewall
Network firewall function & benefits
Firewall ppt
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
Introduction-to-the- inside -Firewall.pptx
Firewall
Importance of Using Firewall for Threat Protection
Ad

More from Patten John (11)

PPTX
Top Security Analytics Tools
PPTX
What is Security Operations Centre? Types, Need and Benefits of SOC
PPTX
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
PPTX
Eliminate Your Fears And Doubts About GDPR
PPTX
The Use Of ELV Systems In Building Security
PPTX
Best Information Security Tips for Better Computing
PPTX
What is SIEM
PPTX
Cyber Forensics and Information Security
PPTX
How keep your data secure
PPTX
Most Important Cyber Security Guidelines
PPTX
Why ISO-27001 is a better choice?
Top Security Analytics Tools
What is Security Operations Centre? Types, Need and Benefits of SOC
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
Eliminate Your Fears And Doubts About GDPR
The Use Of ELV Systems In Building Security
Best Information Security Tips for Better Computing
What is SIEM
Cyber Forensics and Information Security
How keep your data secure
Most Important Cyber Security Guidelines
Why ISO-27001 is a better choice?

Recently uploaded (20)

PDF
Technical SEO Explained: How To Make Your Website Search-Friendly
PPTX
Basic_of_Computer_System.pptx class-8 com
PPTX
IoT Lecture IoT Lecture IoT Lecture IoT Lecture
PPTX
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPTX
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
Introduction: Living in the IT ERA.pptx
PDF
Information Technology practical assignment
PDF
Curriculum Vitae: McGee Steve Resume.pdf
PPTX
Networking2-LECTURE2 this is our lessons
PPT
chapter 5: system unit computing essentials
PDF
B2B Marketing mba class material for study
PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PPTX
BIOS-and-VDU-The-Foundations-of-Computer-Startup-and-Display (1).pptx
DOCX
Audio to Video AI Technology Revolutiona
PPTX
c_languagew_structure_and_functions.pptx
PPTX
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
PPT
Expect The Impossiblesssssssssssssss.ppt
DOCX
MLS 113 Medical Parasitology (LECTURE).docx
Technical SEO Explained: How To Make Your Website Search-Friendly
Basic_of_Computer_System.pptx class-8 com
IoT Lecture IoT Lecture IoT Lecture IoT Lecture
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
JuanConnect E-Wallet Guide for new users.pdf
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
Digital Project Mastery using Autodesk Docs Workshops
Introduction: Living in the IT ERA.pptx
Information Technology practical assignment
Curriculum Vitae: McGee Steve Resume.pdf
Networking2-LECTURE2 this is our lessons
chapter 5: system unit computing essentials
B2B Marketing mba class material for study
Lesson.-Reporting-and-Sharing-of-Findings.pdf
BIOS-and-VDU-The-Foundations-of-Computer-Startup-and-Display (1).pptx
Audio to Video AI Technology Revolutiona
c_languagew_structure_and_functions.pptx
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
Expect The Impossiblesssssssssssssss.ppt
MLS 113 Medical Parasitology (LECTURE).docx

Firewall Security Definition

  • 2. Firewall protection is the one that controls and monitors the network traffic whether it is incoming or outgoing on predetermined rules of security.
  • 3. Simply saying It is basically a barrier or a shield applied specifically to save your PC, phone or tablet from the malwares of external world that exist in abundance on the internet.
  • 4. A barrier against malwares
  • 5. Functioning in simple words It is either a piece of hardware or a software program that helps to keep the hackers, viruses, and worms to stay away from your computer. Simply speaking it screens out all the malicious activities from our network.
  • 6. Advantages • Packet filter is used to inspect the header of the packet to know its destination and where it came from. • All this info is equated to judge whether the packet should be allowed or intercepted. • Specific ports are used by the next Generation firewalls, which designed to filter the network and traffic based on internet.
  • 7. • Proxy firewall security enables protocol aware logging. This makes easy to identify any attack. • A backup of logs is also gained by using this that exist on the servers that are protected by the proxy. • Installed properly at a proper time saves the company or even a person a huge sum of money.
  • 8. Disadvantages • The main function of firewalls is the restriction to a network. This can also block the legitimate users. • The blockage of legitimate employees to access the network of the company can also lead to low productivity levels.
  • 9. • Usually, these blockages are applied using strict policies so the employees might use the backdoor methods for accessing the network. • Also firewalls don’t protect against the internal wreckage and damage,
  • 10. • Which allows the unethical employees to take advantage of the weak points in the network. • Hardware firewalls are normally more expensive and need specialized staff to maintain, install and monitor the operations.
  • 11. Types of attacks against which networks are protected • IP spoofing attacks • Denial of service attacks (DoS attacks) • Man in the middle attack • Firewall security is also essential in sniffer attack
  • 12. Firewall based on circuit level gateways advantages • Performance of network is not affected of affected very less. • The direct connection between the trusted client and the untrusted host is terminated • It possess much high level of security as compared to packet filter firewalls