Network Security Class Notes
Network Security Class Notes
IT Systems Security
Firewalls and analysis tools
Mercy Chitauro
Faculty of Computing and Informatics
Department of Computer Sciences
Outline
1. Firewalls
2. Wireless Network Security
3. Scanning and Analysis Tools
Firewalls
• Firewalls in a building are intended to
inhibit the spread of fire from one part of
the building to another
Firewall
https://sdinspect.com/health-and-safety/understanding-firewalls/
What is a Firewall?
• A Firewall is a device that filters all traffic
between a protected ‘inside’ network
and a less trustworthy or ‘outside’
network.
• Usually runs on a dedicated device
• A firewall permits or blocks data flow
between two parts of a network
architecture.
Firewall Default Behavior
• Default permit – that which is not
expressly forbidden is permitted
• Default deny – that which is not
expressly permitted is forbidden
Firewalls ctd…
• Firewalls enforce predetermined rules
governing what traffic can flow
• A firewall implements a security policy – a
set of rules that determine what traffic can
or cannot pass through the firewall.
• A firewall is an example of a reference
monitor which means it has 3 characteristics
– Always invoked
– Tamperproof
– Small and simple enough for rigorous analysis
Firewall as reference Monitor
• Firewall is always ‘invoked’
– Placement ensures that all traffic to be
controlled passes through the firewall
• Tamperproof
– Usually isolated
– Runs minimal OS services
• Small and simple enough for rigorous
analysis
– Functionality is very simple
Types of Firewalls
• Packet Filtering Gateways or screening
routers
• Stateful inspection firewalls
• Application-level gateways or proxies
• Circuit level gateways
• Guards
• Personal firewalls
Packet Filter
Packet Filter
Stateful Inspection
• Maintains state
information from one
packet to another in the
input stream
Application Proxy Gateway
• Simulates the behavior of a
protected application on the inside
network, allowing only safe data
• Acts as a relay of application-level
traffic
• If the gateway does not implement
the proxy code for a specific
application, the service is not
supported and cannot be
forwarded across the firewall
• The gateway can be configured to
support only specific features of an
application that the network
administrator considers acceptable
while denying all other features
Proxy firewall
Circuit-level Gateway
Screening
2. Firewall on a Separate LAN
3. Application Proxy
Demilitarised Zone (DMZ)
What Firewalls Can and Cannot Do
• Firewalls can protect an environment only if they control
the entire perimeter
• Firewalls do not protect data outside the perimeter
• Firewalls are the most visible part of an installation to the
outside, so they are an attractive target for attack
• Firewalls must be correctly configured, that configuration
must be updated as the environment changes, and firewall
activity reports must be reviewed periodically for evidence
of attempted or successful intrusion
• Firewalls exercise only minor control over the content
admitted to the inside, meaning that inaccurate or
malicious code must be controlled by means inside the
perimeter
Firewall limitations
Cannot protect against
attacks that bypass the
firewall
By Alicia Coon
Scanning and Analysis Tools
QUESTIONS?
References for this Chapter
• Pfleeger, C. P., & Pfleeger, L. S. (2015).
Security in computing (5th ed.). New
Jersey, USA: Pearson Education Inc
• Whitman, M. E. & Mattord, H. J. (2014).
Management of information security (4th
ed.). Thomson Course Technology