SlideShare a Scribd company logo
1 of 23
www.studymafia.org
Content
 Introduction
 What is a Firewall
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Content….
 Types
 Basic Concepts of Firewall
 Role of Firewall
 Advantages
 Disadvantages
 Conclusion
Introduction
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
What is the difference between a host-based firewall
and a network-based firewall?
 A host-based firewall is installed on an individual computer to
protect it from activity occurring on its network.
 A network-based firewall is implemented at a specified point in
the network path and protects all computers on the “internal” side
of the firewall from all computers on the “external” side of the
firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.
History of Firewalls
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
Application-level Gateway
 Also called proxy server
 Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed
Basic concepts of a firewall
 Source
 Destination
 Service
 Action
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
Advantages of firewall
 Concentration of security all modified software and logging is
located on the firewall system as opposed to being distributed on
many hosts;
 Protocol filtering, where the firewall filters protocols and services
that are either not necessary or that cannot be adequately secured
from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby revealing
less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before connecting
further, thereby filtering the protocol;
Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
Conclusion
 One of the best things about a firewall from a security standpoint
is that it stops anyone on the outside from logging onto a
computer in your private network.
 While this is a big deal for businesses, most home networks will
probably not be threatened in this manner. Still, putting a firewall
in place provides some peace of mind.
Thanks..!!!

More Related Content

What's hot (20)

firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Firewall
FirewallFirewall
Firewall
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Network security
Network security Network security
Network security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 

Similar to Firewall (20)

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
FirewallFirewall
Firewall
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Note8
Note8Note8
Note8
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 

More from Naga Dinesh

More from Naga Dinesh (20)

pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Firewall

  • 2. Content  Introduction  What is a Firewall  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 3. Content….  Types  Basic Concepts of Firewall  Role of Firewall  Advantages  Disadvantages  Conclusion
  • 4. Introduction  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 5. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 6. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 7. What is the difference between a host-based firewall and a network-based firewall?  A host-based firewall is installed on an individual computer to protect it from activity occurring on its network.  A network-based firewall is implemented at a specified point in the network path and protects all computers on the “internal” side of the firewall from all computers on the “external” side of the firewall.
  • 8. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 9. History of Firewalls  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 10. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 11. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 12. Types of firewalls  Packet-filtering Router
  • 13. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 14. Types of firewalls…  Application-level Gateway
  • 15. Application-level Gateway  Also called proxy server  Acts as a relay of application-level traffic
  • 16. Types of firewalls…  Circuit-level Gateway
  • 17. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 18. Basic concepts of a firewall  Source  Destination  Service  Action
  • 19. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 20. Advantages of firewall  Concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 21. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.
  • 22. Conclusion  One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network.  While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.