SlideShare a Scribd company logo
Unit3-NetworkSecurity
Firewall
Overview of Firewall Types and Network
Security
L R SIVA RAMAN
ASSISTANT PROFESSOR
PG & RESEARCH DEPARTMENT OF INTERNATIONAL BUSINESS
Sri Ramakrishna college of arts & science
UnderstandingFirewalls
Definition: A firewall is a network
security device that monitors and
controls incoming and outgoing network
traffic based on predetermined security
rules.
Purpose: Establishes a barrier between a
trusted internal network and untrusted
external networks, such as the Internet.
Types: Hardware, Software, or Both
DifferentTypesofFirewalls
Proxy Firewall:
Acts as a gateway from one network to
another for specific applications.
Provides additional functionalities such as
content caching and security.
May impact throughput capabilities.
Stateful Inspection Firewall:
Monitors the state, port, and protocol of traffic.
Makes filtering decisions based on
administrator-defined rules and context from
previous connections.
AdvancedFirewallTechnologies
Unified Threat Management (UTM) Firewall:
Combines stateful inspection, intrusion
prevention, and antivirus capabilities.
Focuses on simplicity and ease of use.
Next-Generation Firewall (NGFW):
Blocks modern threats such as advanced
malware and application-layer attacks.
Includes standard firewall capabilities,
integrated intrusion prevention, application
awareness, and techniques for evolving
security threats.
ImportanceofNetworkSecurity
Complexity in Network Environments:
Ensuring controlled access to the network.
Protecting data during transmission across the
network.
Client-Server Security:
Uses various authorization methods to ensure
only valid users and programs access
information resources.
Data and Transaction Security:
Ensures privacy and confidentiality in
electronic messages and data packets.
Prevents identity assumption during electronic
communications.

More Related Content

Similar to Network Security Firewall(Basics of Firewall)

A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
BluechipComputerSyst
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
IJERA Editor
 
FIREWALLS.pptx
FIREWALLS.pptxFIREWALLS.pptx
FIREWALLS.pptx
EkanshBhatnagar2
 
Firewall.pptx
Firewall.pptxFirewall.pptx
Firewall.pptx
SourabhPanigrahi2
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
Firewall basics - types,architecture ,defination
Firewall basics - types,architecture ,definationFirewall basics - types,architecture ,defination
Firewall basics - types,architecture ,defination
Sucheta70
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
Revanth71
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
marghali
 
Firewall
FirewallFirewall
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
Anthony Daniel
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
ShrayamManandhar
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
IT AMC Support Dubai - Techno Edge Systems LLC
 
Firewall
FirewallFirewall
Firewall
Shamima Akther
 
Firewall ppt
Firewall pptFirewall ppt
Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
PawansureshNishad
 
169
169169

Similar to Network Security Firewall(Basics of Firewall) (20)

A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptxA Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
FIREWALLS.pptx
FIREWALLS.pptxFIREWALLS.pptx
FIREWALLS.pptx
 
Firewall.pptx
Firewall.pptxFirewall.pptx
Firewall.pptx
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Firewall basics - types,architecture ,defination
Firewall basics - types,architecture ,definationFirewall basics - types,architecture ,defination
Firewall basics - types,architecture ,defination
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Firewall
FirewallFirewall
Firewall
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
 
169
169169
169
 

Recently uploaded

ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdfADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ifraghaffar125
 
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Beshoelwy
 
How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?
Digital Host
 
DataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-ServicesDataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-Services
Data Vinci
 
netflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentationnetflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentation
ArunRamkumar5
 
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANYTHE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
thesocialstem05
 
Introduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT ServicesIntroduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT Services
Skywardit Solutions
 
prestige-tranquil details of house and rooms
prestige-tranquil details of house and roomsprestige-tranquil details of house and rooms
prestige-tranquil details of house and rooms
Madhavi443720
 
Pros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docxPros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docx
SFC Today
 
Epidemiology of viral hepatitis infection .pptx
Epidemiology of  viral hepatitis infection .pptxEpidemiology of  viral hepatitis infection .pptx
Epidemiology of viral hepatitis infection .pptx
ArunaDevi561806
 
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdfThe Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
Hosting Mastery Hub
 
Presentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptxPresentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptx
estudiomontesdeocape
 
The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?
nirahealhty
 
PSP3 employability assessment form .docx
PSP3 employability assessment form .docxPSP3 employability assessment form .docx
PSP3 employability assessment form .docx
blessfkombo
 
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdfThe Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
nirahealhty
 
INSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdfINSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdf
MishaWilliams2
 

Recently uploaded (16)

ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdfADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
ADEGUNADEGUNADEGUNADEGUNADEGUNADEGUNADEGUN.pdf
 
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
Module 16 Incineration of Healthcare Waste and the Stockholm Convention Guide...
 
How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?How Can Microsoft Office 365 Improve Your Productivity?
How Can Microsoft Office 365 Improve Your Productivity?
 
DataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-ServicesDataVinci-Google Analytics-Consulting-Services
DataVinci-Google Analytics-Consulting-Services
 
netflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentationnetflix-inspired intro for your latest presentation
netflix-inspired intro for your latest presentation
 
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANYTHE SOCIAL STEM- #1 TRUSTED  DIGITAL MARKETING COMPANY
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANY
 
Introduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT ServicesIntroduction To Disaster Recovery IT Services
Introduction To Disaster Recovery IT Services
 
prestige-tranquil details of house and rooms
prestige-tranquil details of house and roomsprestige-tranquil details of house and rooms
prestige-tranquil details of house and rooms
 
Pros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docxPros and Cons of Investing in Stock Market ETFs.docx
Pros and Cons of Investing in Stock Market ETFs.docx
 
Epidemiology of viral hepatitis infection .pptx
Epidemiology of  viral hepatitis infection .pptxEpidemiology of  viral hepatitis infection .pptx
Epidemiology of viral hepatitis infection .pptx
 
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdfThe Ultimate Guide to Web Hosting Reviews in 2024.pdf
The Ultimate Guide to Web Hosting Reviews in 2024.pdf
 
Presentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptxPresentación1InteligenciaArtificial.pptx
Presentación1InteligenciaArtificial.pptx
 
The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?The Money Wave 2024 Review: Is It the Key to Financial Success?
The Money Wave 2024 Review: Is It the Key to Financial Success?
 
PSP3 employability assessment form .docx
PSP3 employability assessment form .docxPSP3 employability assessment form .docx
PSP3 employability assessment form .docx
 
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdfThe Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdf
 
INSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdfINSET Powerpoint Presentation Science Session 5.pptx.pdf
INSET Powerpoint Presentation Science Session 5.pptx.pdf
 

Network Security Firewall(Basics of Firewall)

  • 1. Unit3-NetworkSecurity Firewall Overview of Firewall Types and Network Security L R SIVA RAMAN ASSISTANT PROFESSOR PG & RESEARCH DEPARTMENT OF INTERNATIONAL BUSINESS Sri Ramakrishna college of arts & science
  • 2. UnderstandingFirewalls Definition: A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Purpose: Establishes a barrier between a trusted internal network and untrusted external networks, such as the Internet. Types: Hardware, Software, or Both
  • 3. DifferentTypesofFirewalls Proxy Firewall: Acts as a gateway from one network to another for specific applications. Provides additional functionalities such as content caching and security. May impact throughput capabilities. Stateful Inspection Firewall: Monitors the state, port, and protocol of traffic. Makes filtering decisions based on administrator-defined rules and context from previous connections.
  • 4. AdvancedFirewallTechnologies Unified Threat Management (UTM) Firewall: Combines stateful inspection, intrusion prevention, and antivirus capabilities. Focuses on simplicity and ease of use. Next-Generation Firewall (NGFW): Blocks modern threats such as advanced malware and application-layer attacks. Includes standard firewall capabilities, integrated intrusion prevention, application awareness, and techniques for evolving security threats.
  • 5. ImportanceofNetworkSecurity Complexity in Network Environments: Ensuring controlled access to the network. Protecting data during transmission across the network. Client-Server Security: Uses various authorization methods to ensure only valid users and programs access information resources. Data and Transaction Security: Ensures privacy and confidentiality in electronic messages and data packets. Prevents identity assumption during electronic communications.