SlideShare una empresa de Scribd logo
1 de 15
FIREWALLS :
REAL TIME PROTECTION
M.Emin Özgünsür
07070001052
SOFL-102
2010, Izmir
1) Why computers need to protect ?
2) Why we need firewall ?
3) How can 2 computers connect ?
4) What is the firewall types ?
5) What is the firewall ?
6) What can we use generally firewall types ?
7) What is the software firewall types ?
7.1) Packet filtering
7.2) Application level
7.3) Circuit level
8) What is firewall function ?
Table Of ContentsTable Of Contents
If a home or business computer owner bounds to a network or an
internet connection, their personal datas open to reach unauthorized
person who have a connection a network or an internet.
This situation will become harder to protect data security than to
provide local area network or internet data security. Because, a
system of computer how much having strong external relations, it will
become more undefend system.
Also,it is exposed to spies, thieves, hackers, thrill seekers, or various.So
that, users need to be increasingly vigilant of security issues.
Why computers need to protect ?Why computers need to protect ?
Why we need firewall ?Why we need firewall ?
Many entry points go towards to host, must be
guard with a simple login request.The most
sources of danger are databases, network files
and mailers.
However some protocols inadequate to provide
adequate service, its required from the local
users. So, this computer will take more attack. If
a computer user’s set a limit for a single
building, it will become harder for an foreigner
to trickle into system.
On the other hand, a computer which
connected to network, can be reached from
any point on the network.At the end of,
networks have constitute a security crossing
problem.Generally, one of the solution way
about computer data security is firewall.
How can 2 computers connect ?How can 2 computers connect ?
We can see it in Windows Operating System, “netstat -n “ command
to cmd. In this cmd we can see “ established “ word. Established
connections are correctly connecting with A machine to our machine.
What is the firewall types ?What is the firewall types ?
Firewalls are softwares or hardwares which provide permission
control, obstructing and filtering to unauthorized reaching come from
on network or on internet.
Its could be seperate three groups of software, hardware or both of
them to each other.
What is the firewall ?What is the firewall ?
Broadly speaking, a computer firewall is a software program that
prevents unauthorized access to or from a private network.
Firewalls are tools that can be used to enhance the security of
computers connected to a network, such as LAN or the Internet. They
are an integral part of a comprehensive security framework for your
network.
What is the firewall ?What is the firewall ?
In theory, a firewall absolutely isolates your computer from the
Internet using a "wall of code" that inspects each individual "packet"
of data as it arrives at either side of the firewall — inbound to or
outbound from your computer — to determine whether it should be
allowed to pass or be blocked.
What can we use generally firewall types ?What can we use generally firewall types ?
Hardware firewalls are expensive for home users. Hardware firewalls
are generally used by data centers which hosting datas on the
internet.
The most antiviruses have connected with firewalls and each
computer users have an antivirus programs. So home users generally
use software firewalls.
What is the software firewall types ?What is the software firewall types ?
Firewalls could be classifying three main categories. It could be
arranging generally, packet filtering, circuit gateways, and
application gateways.
Some other sources talked about fourth filtering of statefull inspection
firewalls. Traditionally, firewalls are placed between an organization
and the outside world. But a large organization may need internal
firewalls as well to isolate DMZ (also known as administrative
domains).
DMZ which known De Militarized Zone network, is created out of a
network connecting two firewalls when two or more firewalls exist in
the networks connecting the firewalls.
What is the packet filtering gateways ?What is the packet filtering gateways ?
First category of firewalls is packet - filtering gateways. This type
firewalls control IP protocol, IP adress and port number include own
rules.
From there, the firewall would start at the top of the ruleset and
work down through the rules. In the table a sample of a packet filter
firewall ruleset for an imaginary network is shown.
What is the application – level gateway ?What is the application – level gateway ?
Second category of firewalls is application - level gateway. It is
opposite of firewall designs.
In this type firewall, its system prefer to using general specified
mechanism to allow many different kids of traffic to flow.
The code, can be used for each
desired applications. This type
firewalls search some protocols
which work in application layer in
OSI models. If we describe OSI
models, it is a seven layer’s standard
which using by computers for
communicating in networks.
What is the circuit – level gateway ?What is the circuit – level gateway ?
Third category of firewalls is circuit - level gateway. Circuit gateways
relay TCP connections. The caller connects to a TCP port on the
gateway, which connects to some destination on the other side of the
gateway. During the call the gateway’s relay programs copy the
bytes back and forth: the gateway acts as a wire. In some cases a
circuit connection is made automatically.
For example, we have a host outside our gateway that needs to use
an internal printer. We have told that host to connect to the print
service on the gateway. Our gateway is configured to relay that
particular connection to the printer port on an internal machine.
What is firewall function ?What is firewall function ?
THANKS YOU
FOR
LISTENING
M.Emin Özgünsür

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
FireWall
FireWallFireWall
FireWall
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Firewall
FirewallFirewall
Firewall
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 

Destacado

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...Serhad MAKBULOĞLU, MBA
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Muhammad Farooq Hussain
 
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...PROBOTEK
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 
Firewall
FirewallFirewall
FirewallApo
 
Firewall
FirewallFirewall
FirewallApo
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 

Destacado (19)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
Windows Server 2012 Developer Preview Active Directory Kurulum ve Gelen Yenil...
 
Advance firewalls
Advance firewallsAdvance firewalls
Advance firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
 
Checkpoint r77
Checkpoint r77Checkpoint r77
Checkpoint r77
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
checkpoint
checkpointcheckpoint
checkpoint
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Vpn
VpnVpn
Vpn
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 

Similar a Firewall presentation m. emin özgünsür

Similar a Firewall presentation m. emin özgünsür (20)

Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Day4
Day4Day4
Day4
 
What is fire wall and how it works
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it works
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewalls
FirewallsFirewalls
Firewalls
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Firewall presentation m. emin özgünsür

  • 1. FIREWALLS : REAL TIME PROTECTION M.Emin Özgünsür 07070001052 SOFL-102 2010, Izmir
  • 2. 1) Why computers need to protect ? 2) Why we need firewall ? 3) How can 2 computers connect ? 4) What is the firewall types ? 5) What is the firewall ? 6) What can we use generally firewall types ? 7) What is the software firewall types ? 7.1) Packet filtering 7.2) Application level 7.3) Circuit level 8) What is firewall function ? Table Of ContentsTable Of Contents
  • 3. If a home or business computer owner bounds to a network or an internet connection, their personal datas open to reach unauthorized person who have a connection a network or an internet. This situation will become harder to protect data security than to provide local area network or internet data security. Because, a system of computer how much having strong external relations, it will become more undefend system. Also,it is exposed to spies, thieves, hackers, thrill seekers, or various.So that, users need to be increasingly vigilant of security issues. Why computers need to protect ?Why computers need to protect ?
  • 4. Why we need firewall ?Why we need firewall ? Many entry points go towards to host, must be guard with a simple login request.The most sources of danger are databases, network files and mailers. However some protocols inadequate to provide adequate service, its required from the local users. So, this computer will take more attack. If a computer user’s set a limit for a single building, it will become harder for an foreigner to trickle into system. On the other hand, a computer which connected to network, can be reached from any point on the network.At the end of, networks have constitute a security crossing problem.Generally, one of the solution way about computer data security is firewall.
  • 5. How can 2 computers connect ?How can 2 computers connect ? We can see it in Windows Operating System, “netstat -n “ command to cmd. In this cmd we can see “ established “ word. Established connections are correctly connecting with A machine to our machine.
  • 6. What is the firewall types ?What is the firewall types ? Firewalls are softwares or hardwares which provide permission control, obstructing and filtering to unauthorized reaching come from on network or on internet. Its could be seperate three groups of software, hardware or both of them to each other.
  • 7. What is the firewall ?What is the firewall ? Broadly speaking, a computer firewall is a software program that prevents unauthorized access to or from a private network. Firewalls are tools that can be used to enhance the security of computers connected to a network, such as LAN or the Internet. They are an integral part of a comprehensive security framework for your network.
  • 8. What is the firewall ?What is the firewall ? In theory, a firewall absolutely isolates your computer from the Internet using a "wall of code" that inspects each individual "packet" of data as it arrives at either side of the firewall — inbound to or outbound from your computer — to determine whether it should be allowed to pass or be blocked.
  • 9. What can we use generally firewall types ?What can we use generally firewall types ? Hardware firewalls are expensive for home users. Hardware firewalls are generally used by data centers which hosting datas on the internet. The most antiviruses have connected with firewalls and each computer users have an antivirus programs. So home users generally use software firewalls.
  • 10. What is the software firewall types ?What is the software firewall types ? Firewalls could be classifying three main categories. It could be arranging generally, packet filtering, circuit gateways, and application gateways. Some other sources talked about fourth filtering of statefull inspection firewalls. Traditionally, firewalls are placed between an organization and the outside world. But a large organization may need internal firewalls as well to isolate DMZ (also known as administrative domains). DMZ which known De Militarized Zone network, is created out of a network connecting two firewalls when two or more firewalls exist in the networks connecting the firewalls.
  • 11. What is the packet filtering gateways ?What is the packet filtering gateways ? First category of firewalls is packet - filtering gateways. This type firewalls control IP protocol, IP adress and port number include own rules. From there, the firewall would start at the top of the ruleset and work down through the rules. In the table a sample of a packet filter firewall ruleset for an imaginary network is shown.
  • 12. What is the application – level gateway ?What is the application – level gateway ? Second category of firewalls is application - level gateway. It is opposite of firewall designs. In this type firewall, its system prefer to using general specified mechanism to allow many different kids of traffic to flow. The code, can be used for each desired applications. This type firewalls search some protocols which work in application layer in OSI models. If we describe OSI models, it is a seven layer’s standard which using by computers for communicating in networks.
  • 13. What is the circuit – level gateway ?What is the circuit – level gateway ? Third category of firewalls is circuit - level gateway. Circuit gateways relay TCP connections. The caller connects to a TCP port on the gateway, which connects to some destination on the other side of the gateway. During the call the gateway’s relay programs copy the bytes back and forth: the gateway acts as a wire. In some cases a circuit connection is made automatically. For example, we have a host outside our gateway that needs to use an internal printer. We have told that host to connect to the print service on the gateway. Our gateway is configured to relay that particular connection to the printer port on an internal machine.
  • 14. What is firewall function ?What is firewall function ?