Digital Rights Protection (Network Security) .: A Paperpresentation On
Digital Rights Protection (Network Security) .: A Paperpresentation On
EMAIL:
Mobile:
9573439551 9848298259
Swarna Bharathi Institute of Science & Technology
Near Mamatha Hospital,
KHAMMAM-507002.
ABSTRACT
Content Overview
• Introduction
• What is a firewall?
• How to implement a firewall?
• Features of firewall
• Types of firewalls
• Packet filter
• Circuit level gateways
• Application level gateways
• Stateful multilayer inspection
• Reason to have a firewall in place
• Availability
• Evaluating a firewall solution
• Advantages
• Disadvantages
• Compendium
• Bibliography
1.INTRODUCTION
2.FEATURES OF FIREWALL
Stateful inspection
Circuit-level inspection
3.TYPES OF FIREWALL
Packet Filter: Part of a router which receives packets from one network
and forwards them to another. Each packet is compared to a set of criteria
and may be discarded, forwarded, or notify the sender. Packet filtering is low
cost and doesn't require a lot of network effort. This only works at the
network layer though and does not support sophisticated rule based models.
Circuit Level Gateways: work at the session level of the OSI model or
TCP layer of the TCP/IP. They monitor packets passing through to check
legitimacy. They are inexpensive and are able to hide information about the
private network that it protects. However they do not filter individual
packets.
5. AVAILABILITY
To increase the availability of the firewall, it can be implemented as a single
firewall device with or without redundant components or as a redundant pair
of firewalls incorporating some type of failover and/or load balancing
mechanism.
There are many yardsticks against which a firewall system can be measured.
We discuss some of these in this section, with the aim of generalizing the
selection criteria for a firewall system, rather than discussing specifics of
individual systems.
1. Cost: When putting together a firewall system, it is worth remembering
that the cost involved does not end with the hardware and software
purchases; there may also be costs involved concerning the installation of
the system and the training of the firewall administrators. Additionally, there
are likely to be ongoing costs associated with external support and internal
administration of the firewall, as regular policy reviews and security audits
are recommended.
2. Functionality: The functionality of a firewall solution is perhaps the most
important criteria for evaluation; does a chosen solution fully meet your
current and predicted requirements? You
should have a growth plan for your network. Will your firewall still work three
years from now? You might want to run the same software product but on
different or upgraded physical hardware (e.g. to meet rising bandwidth
usage). The lifecycles of network equipment for Internet connections are
fairly short, so you should make sure that the basic architecture that you put
in place is likely to be viable in the long term.
3. De-Militarized Zone: A DMZ, also known as a perimeter network, is
a third network added between the internal and external networks, or
alternatively an extra independent interface (or more) on your firewall host.
Services that you wish to be made available to external users may be
located on the
DMZ. If these services are compromised by an attacker, they will not have
access to your internal network, because you will have another firewall, or
rules applicable across another interface, to protect your internal network.
4. Media: Does the firewall system under evaluation support the media
interfaces required, e.g. 10 or 100Mbit Ethernet, quad Ethernet cards,
Gigabit Ethernet, ATM or FDDI?
5. Filtering: If a firewall performs stateful inspection of packets (e.g.
SMTP, FTP or HTTP), or uses a proxy system, which protocols does it cover.
And does the firewall have the ability to control the content of the data that
passes through it. For example, firewalls often have the ability to provide
access control and enforce policy for web browsing, and may also scan for
possibly malicious content such as Java applets, ActiveX controls, or even
viruses in e-mail attachments. Firewalls may alternatively be able to redirect
content to another server for processing or filtering.
6. Number of interfaces: It is worth checking that the system under
evaluation supports the number of network interfaces that are required;
most firewalls should be able to perform filtering between more than two
networks, e.g. for a "collapsed" DMZ configuration.
7.Fault tolerance: If the firewall goes down or is compromised, can a
backup system take over automatically?
7. ADVANTAGES
1)The firewall protect us from viruses and many threats
2)Firewall are excellent at rejecting connection requests for inappropriate
services
3)Firewall detect attempted intrusions
4)Firewall can reduce the actual attacks by insiders
8.DISADVANTAGES
Restricted Access to Desirable Services
A firewall may well restrict certain inherently dangerous services which users
of the protected network nevertheless want to use..
Decrease in Throughput
Firewalls may represent a significant bottleneck in communication between
the protected network and the outside world.
Concentrated Security
While having security concentrated on one host has its advantages, a
compromise of the firewall could be disastrous to hosts which are not
running their own security software [1].
Complacency
Both users and management may tend to become complacent about
security when a firewall is installed.
9.COMPENDIUM
Security is a very difficult topic. Everyone has a different idea of what
``security'' is, and what levels of risk are acceptable. The key for building a
secure network is to define what security means to your organization.
Firewalls cannot eliminate security vulnerabilities, but risks can be
considerably reduced. For a typical small business network with 5 to 20
workstations, a simple NAT router is sufficient. Larger networks may invest in
a more sophisticated solution.
Bibliography
www.altavista.com
www.wikipedia.com
www.cse.buffalo.com