Professional Documents
Culture Documents
Firewall (Information Security System)
Firewall (Information Security System)
FIREWALL
BY: Pedro Pereira, Jennifer Manhice, Abicinane Mussagy
2
FIREWALL
• A Firewall is a network security device that monitors and filters incoming and outgoing
network traffic based on an organization's previously established security policies. At its
most basic, a firewall is essentially the barrier that sits between a private internal network
and the public Internet.
• A firewall is a network security device that analyses network traffic entering and leaving
your network. It permits or denies traffic based on a set of security rules.
• A firewall protects your network by acting as a 24/7 filter, examining data that seeks to enter
your network and blocking anything that appears suspect.
3
ADVANTAGES AND
DISADVANTAGES OF FIREWALL
Advantages Disadvantages
• Monitor Traffic • Cost
• Protection against Trojans • User Restriction
• Prevent Hackers • Performance
• Access Control • Malware Attacks
• Better Privacy • Complex Operations
5
TYPES OF FIREWALL
• Packet-filtering Firewalls: is a network security technique that regulates data flow to and from a network.
• Circuit-level Gateways: is a type of firewall that operates on layer 5 of the Open Systems Interconnection (OSI) model,
which is the session layer.
• Application-level Gateways (Proxy Firewalls):are a type of network security solution that takes action on behalf of the
apps and programs they're set to monitor in a network.
• Stateful Multi-layer Inspection (SMLI) Firewalls:uses a sophisticated form of packet-filtering that examines all seven
layers of the Open System Interconnection (OSI) model.
• Next-generation Firewalls (NGFW): is within the third generation of firewall technology, designed to address advanced
security threats at the application level through intelligent, context-aware security features.
• Network Address Translation (NAT) Firewalls: translates between external and internal IP addresses.
• Cloud Firewalls: are software-based, cloud deployed network devices, built to stop or mitigate unwanted access to
private networks.
• Unified Threat Management (UTM) Firewalls: when multiple security features or services are combined into a single
device within your network.