Security Benefits of Firewall Protection - PowerPoint PPT Presentation

About This Presentation
Title:

Security Benefits of Firewall Protection

Description:

A firewall imposes restrictions on incoming and outgoing packets to and from the private network. All the traffic, whether incoming or outgoing, must pass through the firewall, and only authorized traffic is allowed to pass through it. – PowerPoint PPT presentation

Number of Views:89

less

Transcript and Presenter's Notes

Title: Security Benefits of Firewall Protection


1
Security Benefits of Firewall Protection
2
The primary approach of using a Firewall is to
deal with numerous point regarding security of
your Server or Host.
3
  • A Firewall imposes restrictions on incoming and
    outgoing packets to and from the private network.
  • All the traffic, whether incoming or outgoing,
    must pass through the firewall, and only
    authorized traffic is allowed to pass through it. 

4
Some of the segments that covers under these
benefits are
5
1. Overall Controlled Access to Site Systems
6
  • A Firewall act as a barrier to control access
    over to a site system.
  • This can be explained by the example that if some
    host can be made reachable from outside networks,
    whereas others can be effectively sealed off from
    unwanted access.

7
  • A site could prevent outside access to its hosts
    except for special cases such as mail servers or
    information servers.
  • Thus providing a filtering system which enables
    only those that meet the access policy.

8
2. Concentrated Security
9
  • A Firewall remains the better choice for
    organizations willing to cut costs on their
    security mechanism.
  • Simply put, it becomes easier to set unique
    security credentials on the Firewall itself, and
    it works on all systems accessing the network.

10
  • Firewall is also a better option because it
    requires less installation and maintenance costs,
    unlike other solutions.
  • Despite of the fact that Kerberos and other
    security mechanisms have their added benefits
    over Firewall, the letter one remains more
    popular due to its simplicity, specialization and
    less costs.

11
3. Enhance System Privacy
12
  • Privacy is one of the crucial factors that must
    be taken care as innocuous information might
    contain clue that termed to be very helpful to
    hackers or attackers.
  • Since to overcome these factors and grab a much
    effective security value, a Firewall comes in
    action.

13
  • They help in blocking services that can be helped
    in leaking this information such as finger and
    Domain Name Service.
  • These Firewalls can also be used to block DNS
    information about site systems, thus the names
    and IP addresses of site systems would not be
    available to Internet hosts.

14
4. Shield from Network Misuse, Policy Enforcement
15
  • A Firewall can be very beneficial if it was used
    as a filter towards all of the internet access to
    and from the system passes through it.
  • The firewall can log accesses and provide
    valuable statistics about network usage.

16
  • It is very beneficial to collect network usage
    statistics and evidence of probing for a number
    of reasons.
  • One of the primary importance is knowing whether
    the firewall is withstanding probes and attacks,
    and determining whether the controls on the
    firewall are adequate thus helping in maintaining
    risk factors.

17
5. Defending Vulnerable Services
18
  • A Firewall can enhance network security and
    reduce risks to hosts by filtering inherently
    insecure services.
  • As a result, the subnet gets shield from all of
    the risks, as only selected protocols will be
    able to pass through the Firewall.

19
  • A Firewall could block any vulnerable services
    such as NFS from entering or leaving a subnet.
  • A Firewall could reject all source-routed packets
    and ICMP redirects and then inform administrators
    of the incidents.

20
CONCLUSION
A Linux Firewall acts as a shield for your system
through five different stages, from the time it's
installed on your computer to the appearance of
the ransom warning on your screen.
Write a Comment
User Comments (0)
About PowerShow.com