4
Most read
6
Most read
7
Most read
Impact to IT security of incorrect
configuration of firewall policies and
third-party VPNs
LECTURER: USMAN BUTT
LECTURER: USMAN BUTT
Mistakes You Need to Avoid
A misconfigured firewall can be as dangerous as having no firewall at all. Here's a look at five
common firewall oversights that can leave any network open to attack.
Firewalls are a main line of defense against all types of network invaders, yet even after years of research
and experience, many organizations still make configuration mistakes that leave their networks vulnerable
to data theft, sabotage, and other types of mayhem.
Here's a rundown of five unsound firewall practices that should be avoided at all cost.
LECTURER: USMAN BUTT
Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic and
permits or blocks data packets based on a set of security rules. Its purpose is to establish a
barrier between your internal network and incoming traffic from external sources (such as the
internet) in order to block malicious traffic like viruses and hackers.
LECTURER: USMAN BUTT
How does a firewall work?
Firewalls carefully analyze incoming traffic based on pre-established rules and filter traffic
coming from unsecured or suspicious sources to prevent attacks. Firewalls guard traffic at a
computer’s entry point, called ports, which is where information is exchanged with external
devices. For example, “Source address 172.18.1.1 is allowed to reach destination 172.18.2.1
over port 22."
Think of IP addresses as houses, and port numbers as rooms within the house. Only trusted
people (source addresses) are allowed to enter the house (destination address) at all—then it’s
further filtered so that people within the house are only allowed to access certain rooms
(destination ports), depending on if they're the owner, a child, or a guest. The owner is allowed
to any room (any port), while children and guests are allowed into a certain set of rooms
(specific ports).
LECTURER: USMAN BUTT
Types of firewalls
Firewalls can either be software or hardware, though it’s best to have both. A software firewall is
a program installed on each computer and regulates traffic through port numbers and
applications, while a physical firewall is a piece of equipment installed between your network
and gateway.
LECTURER: USMAN BUTT
Packet-filtering firewalls
the most common type of firewall, examine packets and prohibit them from passing through if
they don’t match an established security rule set. This type of firewall checks the packet’s source
and destination IP addresses. If packets match those of an “allowed” rule on the firewall, then it
is trusted to enter the network.
Packet-filtering firewalls are divided into two categories: stateful and stateless. Stateless
firewalls examine packets independently of one another and lack context, making them easy
targets for hackers. In contrast, stateful firewalls remember information about previously passed
packets and are considered much more secure.
While packet-filtering firewalls can be effective, they ultimately provide very basic protection
and can be very limited—for example, they can't determine if the contents of the request that's
being sent will adversely affect the application it's reaching. If a malicious request that was
allowed from a trusted source address would result in, say, the deletion of a database, the
firewall would have no way of knowing that. Next-generation firewalls and proxy firewalls are
more equipped to detect such threats.
LECTURER: USMAN BUTT
Next-generation firewalls (NGFW)
combine traditional firewall technology with additional functionality, such as encrypted traffic
inspection, intrusion prevention systems, anti-virus, and more. Most notably, it includes deep
packet inspection (DPI). While basic firewalls only look at packet headers, deep packet
inspection examines the data within the packet itself, enabling users to more effectively identify,
categorize, or stop packets with malicious data
LECTURER: USMAN BUTT
Proxy firewalls
filter network traffic at the application level. Unlike basic firewalls, the proxy acts an
intermediary between two end systems. The client must send a request to the firewall, where it
is then evaluated against a set of security rules and then permitted or blocked. Most notably,
proxy firewalls monitor traffic for layer 7 protocols such as HTTP and FTP, and use both stateful
and deep packet inspection to detect malicious traffic.
LECTURER: USMAN BUTT
Network address translation (NAT)
firewalls
allow multiple devices with independent network addresses to connect to the internet using a
single IP address, keeping individual IP addresses hidden. As a result, attackers scanning a
network for IP addresses can't capture specific details, providing greater security against attacks.
NAT firewalls are similar to proxy firewalls in that they act as an intermediary between a group
of computers and outside traffic.
LECTURER: USMAN BUTT
Stateful multilayer inspection (SMLI)
firewalls
filter packets at the network, transport, and application layers, comparing them against known
trusted packets. Like NGFW firewalls, SMLI also examine the entire packet and only allow them
to pass if they pass each layer individually. These firewalls examine packets to determine the
state of the communication (thus the name) to ensure all initiated communication is only taking
place with trusted sources.
LECTURER: USMAN BUTT
Virtual private network
A virtual private network extends a private network across a public network and enables users
to send and receive data across shared or public networks as if their computing devices were
directly connected to the private network
LECTURER: USMAN BUTT

More Related Content

PPTX
Tim hortons final project latest ppt
PPTX
Introduction to power apps
PPTX
The CIA triad.pptx
PPT
Network security and protocols
PPT
PPSX
Basic components of a computer network
PPTX
Network topology
PPTX
Network Topology
Tim hortons final project latest ppt
Introduction to power apps
The CIA triad.pptx
Network security and protocols
Basic components of a computer network
Network topology
Network Topology

What's hot (20)

PPTX
Firewall and Types of firewall
PPTX
Network monitoring tools
PDF
SDN Fundamentals - short presentation
PPTX
Intrusion detection
 
PPSX
Security policies
PDF
Network Security Fundamentals
PPTX
Intrusion detection system
PPTX
Network defenses
PPT
Information security management
PPTX
Firewall
PPTX
Network scanning
PPTX
Virtual Private Network(VPN)
PPTX
Network Security
PPTX
Security threats
PPTX
Network Security ppt
PPTX
Types of attacks
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
Cyber kill chain
PPTX
Virtual Private Networks (VPN) ppt
PPT
WAN Technologies slide show
Firewall and Types of firewall
Network monitoring tools
SDN Fundamentals - short presentation
Intrusion detection
 
Security policies
Network Security Fundamentals
Intrusion detection system
Network defenses
Information security management
Firewall
Network scanning
Virtual Private Network(VPN)
Network Security
Security threats
Network Security ppt
Types of attacks
VAPT - Vulnerability Assessment & Penetration Testing
Cyber kill chain
Virtual Private Networks (VPN) ppt
WAN Technologies slide show
Ad

Similar to Impact to it security of incorrect configuration of firewall policies and third party vp ns (20)

PPTX
Firewalls by Puneet Bawa
PPT
DOCX
DOC
PDF
Firewall
PPT
PPT
Firewall protection
DOCX
Firewalls
PPTX
Firewall
PPTX
Firewall basics - types,architecture ,defination
PPTX
FIREWALLS BY SAIKIRAN PANJALA
DOCX
Firewall configuration
PPTX
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
PDF
Firewall
DOCX
Firewall
PDF
UNIT 4 Firewalls Information Security Sharad Institute
PPTX
UNIT-4 network information security ID system
Firewalls by Puneet Bawa
Firewall
Firewall protection
Firewalls
Firewall
Firewall basics - types,architecture ,defination
FIREWALLS BY SAIKIRAN PANJALA
Firewall configuration
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
Firewall
Firewall
UNIT 4 Firewalls Information Security Sharad Institute
UNIT-4 network information security ID system
Ad

Recently uploaded (20)

PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
Modernising the Digital Integration Hub
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
DOCX
search engine optimization ppt fir known well about this
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPT
Geologic Time for studying geology for geologist
sustainability-14-14877-v2.pddhzftheheeeee
Custom Battery Pack Design Considerations for Performance and Safety
Modernising the Digital Integration Hub
Training Program for knowledge in solar cell and solar industry
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
STKI Israel Market Study 2025 version august
Credit Without Borders: AI and Financial Inclusion in Bangladesh
search engine optimization ppt fir known well about this
Consumable AI The What, Why & How for Small Teams.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Getting started with AI Agents and Multi-Agent Systems
NewMind AI Weekly Chronicles – August ’25 Week III
A review of recent deep learning applications in wood surface defect identifi...
Benefits of Physical activity for teenagers.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Statistics on Ai - sourced from AIPRM.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Geologic Time for studying geology for geologist

Impact to it security of incorrect configuration of firewall policies and third party vp ns

  • 1. Impact to IT security of incorrect configuration of firewall policies and third-party VPNs LECTURER: USMAN BUTT LECTURER: USMAN BUTT
  • 2. Mistakes You Need to Avoid A misconfigured firewall can be as dangerous as having no firewall at all. Here's a look at five common firewall oversights that can leave any network open to attack. Firewalls are a main line of defense against all types of network invaders, yet even after years of research and experience, many organizations still make configuration mistakes that leave their networks vulnerable to data theft, sabotage, and other types of mayhem. Here's a rundown of five unsound firewall practices that should be avoided at all cost. LECTURER: USMAN BUTT
  • 3. Firewall A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) in order to block malicious traffic like viruses and hackers. LECTURER: USMAN BUTT
  • 4. How does a firewall work? Firewalls carefully analyze incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks. Firewalls guard traffic at a computer’s entry point, called ports, which is where information is exchanged with external devices. For example, “Source address 172.18.1.1 is allowed to reach destination 172.18.2.1 over port 22." Think of IP addresses as houses, and port numbers as rooms within the house. Only trusted people (source addresses) are allowed to enter the house (destination address) at all—then it’s further filtered so that people within the house are only allowed to access certain rooms (destination ports), depending on if they're the owner, a child, or a guest. The owner is allowed to any room (any port), while children and guests are allowed into a certain set of rooms (specific ports). LECTURER: USMAN BUTT
  • 5. Types of firewalls Firewalls can either be software or hardware, though it’s best to have both. A software firewall is a program installed on each computer and regulates traffic through port numbers and applications, while a physical firewall is a piece of equipment installed between your network and gateway. LECTURER: USMAN BUTT
  • 6. Packet-filtering firewalls the most common type of firewall, examine packets and prohibit them from passing through if they don’t match an established security rule set. This type of firewall checks the packet’s source and destination IP addresses. If packets match those of an “allowed” rule on the firewall, then it is trusted to enter the network. Packet-filtering firewalls are divided into two categories: stateful and stateless. Stateless firewalls examine packets independently of one another and lack context, making them easy targets for hackers. In contrast, stateful firewalls remember information about previously passed packets and are considered much more secure. While packet-filtering firewalls can be effective, they ultimately provide very basic protection and can be very limited—for example, they can't determine if the contents of the request that's being sent will adversely affect the application it's reaching. If a malicious request that was allowed from a trusted source address would result in, say, the deletion of a database, the firewall would have no way of knowing that. Next-generation firewalls and proxy firewalls are more equipped to detect such threats. LECTURER: USMAN BUTT
  • 7. Next-generation firewalls (NGFW) combine traditional firewall technology with additional functionality, such as encrypted traffic inspection, intrusion prevention systems, anti-virus, and more. Most notably, it includes deep packet inspection (DPI). While basic firewalls only look at packet headers, deep packet inspection examines the data within the packet itself, enabling users to more effectively identify, categorize, or stop packets with malicious data LECTURER: USMAN BUTT
  • 8. Proxy firewalls filter network traffic at the application level. Unlike basic firewalls, the proxy acts an intermediary between two end systems. The client must send a request to the firewall, where it is then evaluated against a set of security rules and then permitted or blocked. Most notably, proxy firewalls monitor traffic for layer 7 protocols such as HTTP and FTP, and use both stateful and deep packet inspection to detect malicious traffic. LECTURER: USMAN BUTT
  • 9. Network address translation (NAT) firewalls allow multiple devices with independent network addresses to connect to the internet using a single IP address, keeping individual IP addresses hidden. As a result, attackers scanning a network for IP addresses can't capture specific details, providing greater security against attacks. NAT firewalls are similar to proxy firewalls in that they act as an intermediary between a group of computers and outside traffic. LECTURER: USMAN BUTT
  • 10. Stateful multilayer inspection (SMLI) firewalls filter packets at the network, transport, and application layers, comparing them against known trusted packets. Like NGFW firewalls, SMLI also examine the entire packet and only allow them to pass if they pass each layer individually. These firewalls examine packets to determine the state of the communication (thus the name) to ensure all initiated communication is only taking place with trusted sources. LECTURER: USMAN BUTT
  • 11. Virtual private network A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network LECTURER: USMAN BUTT