1 / 21

Personal Info

Personal Info. Presenter: Mr. NHEAN Sophan Position: Desktop Support Company: Khalibre Co,. Ltd E-mail: sophan.nhean@gmail.com Tel: 0979514961 or 086493591 Skype: sophan.nhean Facebook: www.facebook.com/sophan.nhean. Prepared by: Mr. NHEAN Sophan.

abia
Download Presentation

Personal Info

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personal Info • Presenter: Mr. NHEAN Sophan • Position: Desktop Support • Company: Khalibre Co,. Ltd • E-mail: sophan.nhean@gmail.com • Tel: 0979514961 or 086493591 • Skype: sophan.nhean • Facebook: www.facebook.com/sophan.nhean Prepared by: Mr. NHEAN Sophan

  2. What Firewall can do to protect your Network? Firewall Prepared by: Mr. NHEAN Sophan

  3. Agenda • What is a firewall? • What does a firewall do? • What can’t a firewall do? • Who need a firewall? • How does a firewall work? • What are the protection methods of firewall? • How do we implement a firewall? • Conclusion – Benefits of firewall • Scenario • Questions and Answers Prepared by: Mr. NHEAN Sophan

  4. What is a firewall? • Firewall is a component or set of computer that restrict access between a protected network and the Internet or between a sets of networks. • Protects networked computers from intentional hostile intrusion from outside. • Places a bottleneck (or Choke Point) between the networks • All communications must pass through the bottleneck – this gives us a single point of control Prepared by: Mr. NHEAN Sophan

  5. What is a firewall? • There are two types of firewall • Hardware firewall device • Fortinet • Juniper • CISCO ASA • Software firewall program • IP Chains & IPTables • IPCop • SELinux • ISA Prepared by: Mr. NHEAN Sophan

  6. What can a firewall do? • A firewall examines all traffic routed between two networks to see if it meets certain criteria (allowed if it does, otherwise it dropped) • Focus on security decision (Choke point) • Enforce security policy • Log Internet Activities efficiently Prepared by: Mr. NHEAN Sophan

  7. What can a firewall do? • It filters traffic base on: • Source and Destination IP address • Source and Destination Port number • Protocols used • It protect your computer and personal information from: • Hackers break into your system • Can prevent some kind of virus Prepared by: Mr. NHEAN Sophan

  8. What can't a firewall do? A firewall can’t protect you against: • Phishing scam, spyware or viruses spread through email. • Malicious insider: people who gain physical access to your computer or network • For an unprotected wireless network • After network has been compromised • Connections that don’t go through firewall (Modem users) • Completely new threats Prepared by: Mr. NHEAN Sophan

  9. Who need a firewall? • Anyone who is responsible for a private network that is connected to a public network. • Big, Medium, and Small Enterprise • Anyone who connect from single computer to internet via modem, etc. Prepared by: Mr. NHEAN Sophan

  10. How does firewall work? • A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria.  Outbound Inbound Basic Firewall Operation Prepared by: Mr. NHEAN Sophan

  11. What are the protection methods of firewall? • Packet Filtering • Rejects TCP/IP packets from unauthorized hosts and/or connection attempts but unauthorized hosts • Network Address Translation (NAT) • Translates the addresses of internal hosts so as to hide them from the outside world • Also known as IP masquerading • Proxy Services • Makes high level application level connections to external hosts on behalf of internal hosts to completely break the network connection between internal and external hosts Prepared by: Mr. NHEAN Sophan

  12. How do we implement the firewall? • Determine the access denial methodology to use • Determine Inbound access policy • Determine Outbound access policy • Decide whether to buy a complete firewall product, have one implemented by a systems integrator or implement one yourself. Prepared by: Mr. NHEAN Sophan

  13. Benefits of firewall • Protects private Local Area Network form hostile intrusion from internet • Block harmful packet to reach important resources • Allows network administrators to offer access to specific types of Internet services to selected LAN users • It can protect: • Your Data: the information you keep on computers • Your resource: the computers themselves • Your reputation: Intruders on the Internet appear with your identity. Prepared by: Mr. NHEAN Sophan

  14. Challenging question Isa firewall sufficient to secure my network or do I need anything else? NO! Prepared by: Mr. NHEAN Sophan

  15. Scenario Firewall Scenario Prepared by: Mr. NHEAN Sophan

  16. Scenario 1: Saturday, Midnight Prepared by: Mr. NHEAN Sophan

  17. 5 Minutes later Prepared by: Mr. NHEAN Sophan

  18. Scenario 2: Monday, Midnight OK, let’s try the Insurance company…. This should take about 5 minutes! Black Hacker Prepared by: Mr. NHEAN Sophan

  19. 1 minutes later Information Security Manager Insurance Company Prepared by: Mr. NHEAN Sophan

  20. 5 Hours later Black Hacker Prepared by: Mr. NHEAN Sophan

  21. Questions? Thanks for Your Paying Attention! Source by Building Internet Firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman Prepared by: Mr. NHEAN Sophan

More Related