0% found this document useful (0 votes)
154 views

Digital Rights Protection (Network Security) .: A Paperpresentation On

This document presents a paper on digital rights protection and network security. It discusses network security and the importance of protecting computer systems from hackers and data loss. It focuses on firewalls as a key part of network security, describing their purpose of forming a barrier between networks and examining information passing through. It outlines various firewall types, features, and reasons for implementing firewalls to secure networks.

Uploaded by

rajivunnam
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views

Digital Rights Protection (Network Security) .: A Paperpresentation On

This document presents a paper on digital rights protection and network security. It discusses network security and the importance of protecting computer systems from hackers and data loss. It focuses on firewalls as a key part of network security, describing their purpose of forming a barrier between networks and examining information passing through. It outlines various firewall types, features, and reasons for implementing firewalls to secure networks.

Uploaded by

rajivunnam
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 14

A PAPERPRESENTATION ON

Digital Rights Protection (Network


Security).
Presented by:
S.PRAVEEN KUMAR S.SAICHARAN

COMPUTER SCIENCE AND ENGINEERING


3-1

EMAIL:

[email protected]

Mobile:

9573439551 9848298259
Swarna Bharathi Institute of Science & Technology
Near Mamatha Hospital,
KHAMMAM-507002.

ABSTRACT

Network security comprises the measures a company takes to


protect its computer system, and it is a prime concern for every company
that uses computers. Compromised network security means a hacker or
competitor may gain access to critical or sensitive data, possibly resulting in
data loss, or even complete destruction of the system. Appropriate network
security is achieved when a user has to go through several layers of security
before being able to access the desired network. The more layers the system
has, the more secure it is.

You may sprout a question,What is network? The networks are


computer networks, both public and private, that are used every day to
conduct transactions and communications among businesses, government
agencies and individuals. The networks are comprised of "nodes", which are
"client" terminals (individual user PCs) and one or more "servers" and/or
"host" computers. Today, most companies' host computers can be accessed
by their employees whether in their offices over a private communications
network, or from their homes or hotel rooms while on the road through
normal telephone lines.
One of the most intresting part of our paper is the research
work we have done on the top 10 viruses and the PC’s affected by them.We
have also exposed the threat levels.

Network security comprises of many areas like


risk management, firewalls,secure network devices,network threats etc…Our
paper mainly focuses on tantalizing feature of network security,(i.e)
“FIREWALLS” which is a software or hardware used for security purpose in
our present technological world.We disucussed the topics about types of
firewalls,features ,what it protects u from etc….

Finally we leave the paper with some egematic queries on


firewalls .

Content Overview

• Introduction
• What is a firewall?
• How to implement a firewall?
• Features of firewall
• Types of firewalls
• Packet filter
• Circuit level gateways
• Application level gateways
• Stateful multilayer inspection
• Reason to have a firewall in place
• Availability
• Evaluating a firewall solution
• Advantages
• Disadvantages
• Compendium
• Bibliography

1.INTRODUCTION

In order to provide some level of separation between an organization's


intranet and the Internet, firewalls have been employed. A firewall is simply
a group of components that collectively form a barrier between two
networks. A number of features specific to firewalls and networking are
going to be used throughout this paper, so let's introduce them all together.
What is firewall?
A firewall is a type of security for computers both personal and business.A
firewall is produced as a software and can be installed on to a computer.The
main purpose of a firewall is to examine all the information entering a
computer.If the information entering a computer fails to meet a certain
criteria the information will not pass through into the computer.

How to implement a firewall?


Step1:Determine the access denial methodology to use.
Step2:Determine inbound access policy.
Step3:Determine outbound access policy.
Step4:Determine if dial-in or dail-out access is required.
Step5:Decide whether to buy a complete firewall product have one
implement by a systems
integrator or implement one yourself

2.FEATURES OF FIREWALL

Depending on the features that a firewall supports, traffic is allowed or


blocked using a variety of techniques. These techniques offer different
degrees of protection based on the capabilities of the firewall. The following
firewall features are listed in increasing order of complexity:
Network adapter input
filters

Static packet filters

Network address translation


(NAT)

Stateful inspection

Circuit-level inspection

Application layer filtering


In general, firewalls that provide complex features will also support simpler
features. However, you should read vendor information carefully when
choosing a firewall because there can be subtle differences between the
implied and the actual capability of a firewall. Selection of a firewall typically
involves inquiring about the features as well as testing to ensure that the
product can indeed perform according to specifications.

3.TYPES OF FIREWALL
Packet Filter: Part of a router which receives packets from one network
and forwards them to another. Each packet is compared to a set of criteria
and may be discarded, forwarded, or notify the sender. Packet filtering is low
cost and doesn't require a lot of network effort. This only works at the
network layer though and does not support sophisticated rule based models.
Circuit Level Gateways: work at the session level of the OSI model or
TCP layer of the TCP/IP. They monitor packets passing through to check
legitimacy. They are inexpensive and are able to hide information about the
private network that it protects. However they do not filter individual
packets.

Application Level Gateways: Also called proxies are similar to


circuit-level gateways can filter packets at the application level of the OSI
model. If configured to the web it will not allow any FTP, Gopher, Telnet, or
other traffic through. They examine the packets at application level and filter
specific commands. This cannot be done by packet filtering or circuit level.
Can also be used to log user activity and logins, although they offer a high
level of security they have a high impact on network performance.

Stateful Multilayer Inspection Firewall: Are fairly new and


combine the aspects of the other three types.They filter packets at the
network layer, determine legitimacy and evaluate contents at the application
level. Allows direct connection between client and host. They recognize
information by specific characteristics in order to allow them through. they
are expensive but
provide a high level of security and good network performance. However
they are complex and if not used correctly can comprise security.

4.REASONS TO HAVE A FIREWALL IN PLACE


To protect against. . .
• Viruses and bugs through email
• Unauthorized interactive logins from intruders
• Unwanted materials, pornography, movies, literature, pop-ups
• Important private information that can be tampered with or
accessed outside of a business or organization
• Keeps important departmental information secure form being
tampered with form other departments or disgruntled employees
• Protect individuals information that is stored on there
computer from being viewed or stolen.
• Helps to keep computer performance high by restricting the
number of people that can access your computer and
restricts the virus, worms, and Trojans that my effect
performance

Current Top Active Virus :


PCs First
Virus Threat level
infected appeared
1 Netsky.P 1.80% 21/03/04
2 Mhtredir.gen 1.72% 05/08/04
3 Sdbot.ftp 1.40% 15/12/04
4 Downloader.GK 1.36% 07/06/04
5 Shinwow.E 1.16% 20/09/04
6 21/10/04
1.04%
Downloader.WT
7 Qhost.AF 1.02% 09/03/05
8 03/04/05
0.77%
Downloader.BQK
9 Citifraud.A 0.73% 02/11/04
10 06/04/05
0.71%
Downloader.BSF

5. AVAILABILITY
To increase the availability of the firewall, it can be implemented as a single
firewall device with or without redundant components or as a redundant pair
of firewalls incorporating some type of failover and/or load balancing
mechanism.

Single Firewall without Redundant Components

Single Firewall with Redundant Components

Fault Tolerant Firewalls


A fault tolerant firewall set would include a mechanism to duplex each of the
firewalls .

6.Evaluating a Firewall Solution

There are many yardsticks against which a firewall system can be measured.
We discuss some of these in this section, with the aim of generalizing the
selection criteria for a firewall system, rather than discussing specifics of
individual systems.
1. Cost: When putting together a firewall system, it is worth remembering
that the cost involved does not end with the hardware and software
purchases; there may also be costs involved concerning the installation of
the system and the training of the firewall administrators. Additionally, there
are likely to be ongoing costs associated with external support and internal
administration of the firewall, as regular policy reviews and security audits
are recommended.
2. Functionality: The functionality of a firewall solution is perhaps the most
important criteria for evaluation; does a chosen solution fully meet your
current and predicted requirements? You
should have a growth plan for your network. Will your firewall still work three
years from now? You might want to run the same software product but on
different or upgraded physical hardware (e.g. to meet rising bandwidth
usage). The lifecycles of network equipment for Internet connections are
fairly short, so you should make sure that the basic architecture that you put
in place is likely to be viable in the long term.
3. De-Militarized Zone: A DMZ, also known as a perimeter network, is
a third network added between the internal and external networks, or
alternatively an extra independent interface (or more) on your firewall host.
Services that you wish to be made available to external users may be
located on the
DMZ. If these services are compromised by an attacker, they will not have
access to your internal network, because you will have another firewall, or
rules applicable across another interface, to protect your internal network.
4. Media: Does the firewall system under evaluation support the media
interfaces required, e.g. 10 or 100Mbit Ethernet, quad Ethernet cards,
Gigabit Ethernet, ATM or FDDI?
5. Filtering: If a firewall performs stateful inspection of packets (e.g.
SMTP, FTP or HTTP), or uses a proxy system, which protocols does it cover.
And does the firewall have the ability to control the content of the data that
passes through it. For example, firewalls often have the ability to provide
access control and enforce policy for web browsing, and may also scan for
possibly malicious content such as Java applets, ActiveX controls, or even
viruses in e-mail attachments. Firewalls may alternatively be able to redirect
content to another server for processing or filtering.
6. Number of interfaces: It is worth checking that the system under
evaluation supports the number of network interfaces that are required;
most firewalls should be able to perform filtering between more than two
networks, e.g. for a "collapsed" DMZ configuration.
7.Fault tolerance: If the firewall goes down or is compromised, can a
backup system take over automatically?

7. ADVANTAGES
1)The firewall protect us from viruses and many threats
2)Firewall are excellent at rejecting connection requests for inappropriate
services
3)Firewall detect attempted intrusions
4)Firewall can reduce the actual attacks by insiders

8.DISADVANTAGES
Restricted Access to Desirable Services
A firewall may well restrict certain inherently dangerous services which users
of the protected network nevertheless want to use..

Decrease in Throughput
Firewalls may represent a significant bottleneck in communication between
the protected network and the outside world.
Concentrated Security
While having security concentrated on one host has its advantages, a
compromise of the firewall could be disastrous to hosts which are not
running their own security software [1].
Complacency
Both users and management may tend to become complacent about
security when a firewall is installed.

9.COMPENDIUM
Security is a very difficult topic. Everyone has a different idea of what
``security'' is, and what levels of risk are acceptable. The key for building a
secure network is to define what security means to your organization.
Firewalls cannot eliminate security vulnerabilities, but risks can be
considerably reduced. For a typical small business network with 5 to 20
workstations, a simple NAT router is sufficient. Larger networks may invest in
a more sophisticated solution.
Bibliography
www.altavista.com
www.wikipedia.com
www.cse.buffalo.com

You might also like