Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Firewall Presentation
Why Do I Need Firewall Security?
Why do you need a Firewall?
An open usused port can lead to-
PC Format Magazine (issue 194) ran Windows XP without a firewall, two and a half hours after connecting to the internet the PC was renedered unuasuable
Fire walls protect you from?
Unknowingly be downloaded onto your computer
Clog up your browser
What Firewalls wont protect you from!!
Serves as a protective Barrier
When using the internet you are visible to the world
Three most used ports, world wide web (port 80), email in ( port 110), email out (port 25).
Firewalls help shut off any unused ports
Why do you need a Firewall?
Introduction &History of Firewalls
How Can I Check My Security?
The idea of a wall to keep out intruders dates back thousands of years.
Wall & Firewall
Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity.
History of Firewall
First generation: packet filters
Sits outside the organization network
It is the first device internet traffic encounters.
Generally make their decisions based on the source address, destination address and ports in individual IP packets.
This firewall could choose to only allow data from Port 80 (HTTP) or Port 443 (HTTPS)
Everythings going well...Until!
There are lots of things to secure our computer.
Eset Online Scanner
Microsoft Safety Scanner
Symantec Security Check
How can I check my computer is secure
Choose an operating system
Choose a web browser
When setting up, use strong passwords in your user account, router account etc.
Use trusted sources
Install good antivirus software
Download and install software to deal with spyware such as Spybot Search and Destroy, HijackThis or Ad-aware and scan regularly.
Download and install a firewall.
Close all ports
Perform Penetration Testing.
Consider running intrusion detection software (HIDS)
Don't forget to think in terms of physical security
Use the best Encryption software "Folder Lock"
How to secure your PC: 12 steps
Traditional firewalls will be done away with for two reasons
They don’t inspect the full data payload of network packets
Traditional firewalls don’t have the intelligence to distinguish one kind of Web traffic from another
The Future of Firewalls
Sits inside the organizational network.
Referred to as Next Generation Firewalls.
Rather than simply blocking an IP or port this type of firewall can distinguish between certain applications.
This firewall can tell the difference between different web addresses that come from the same port, source, or destination address.
Examples of what an organization might filter: Facebook, Twitter, popular news sites, Netflix, competitors sites, or any inappropriate sites.
How to test your Firewall?
File Sharing Test
Common Ports Test
All Ports and Services Test
Messenger Spam Test
Browser Disclosure Test
How well protected is your PC?
Test My PC Security has a wide range of downloadable firewall leak and HIPS tests so you can find out just how good your security software is.
If you are connected to the internet, you have a doorway that the rest of the world can use to enter your computer. The purpose of the security tests on Test My PC Security is to find out how well that doorway is protected.
Next Generation Firewalls (NGFW)
Next generation firewalls attempt to search deeper into packets of data being passed without adding latency (time lag) to the inspection process
NGFW’s are application-aware. This allows the firewall to distinguish between application sites (Netflix vs. Salesforce.com) and apply filtering based on business rules
Deep packet inspection techniques allow NGFW’s to search for known malware and keep your computer secure
Next Generation Firewalls Deliver:
Standard first-generation firewall capabilities and protocols
Ability to incorporation information from outside the firewall, such as a directory-based policy
Easily identify undesirable encrypted applications
Full data packet inspection without introducing latency
Information packets are learned and assumed as standard communication to increase data speed.
Simply put, a firewall is a barrier to keep destructive data and software away from your property. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next
It is a tool that gives a business data security and ensures that employees are only using approved websites and applications on the company network
General Overview (Cont.)
As data is passed from another source to your computer firewall software inspects the data packets being transferred
It either allows it to pass through
Or the data is flagged by the filters and is not allowed on the device
Firewalls are equally important for small home networks as large corporate networks. Adds another layer of data security for your devices
， Business administration
our group members
History of Firewall
Types of Firewalls
Why Do You Need Firewall Security？
How Can I Check That My computer Is Secure？
the future firewall
We chose this topic because it plays an important role in internet security and it a major asset to business privacy
China： The great wall
European： Castles with high walls
It is stand for network device， which can establish a barrier protect network security by analyzing and control the incoming and outgoing network data.
The Ultimate Firewall
s discovery of German spies tampering with his system
's "Evening with Berferd" 1992 in which he set up a simple electronic "jail" to observe an attacker
The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls.
Second generation： stateful filter
From 1989-1990 three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls
Third generation: Application layer
some famous events
The massive password capture of the winter of 1994
raised awareness of the need for good computer and network security.
Marcus Ranum, Wei Xu, and Peter Churchyard developed an Application Firewall known as Toolkit (FWTK) in 1994