You are on page 1of 9

Firewalls and

Honeypots
Ethical Hacking

By Durgeshree Naidu,
MSC.I.T [ 1 ]
Firewall – Software & Hardware
Hardware Firewall
A hardware firewall is
a unit that is
connected between
the network and the
device for connecting
to the Internet.

S/w

H/w

Software Firewall
A software firewall is a
program that is
installed on the
computer with the
Internet connection.
Firewall
[List]
Rules

Allow Block Ask


Flows automtically Dangerous to Whether allow or
01 system 02 not 03
Firewall Types

Packet Filtering Stateful Firewall


Firewall A network firewall
Technique used to that tracks the
control network operating state and
access by monitoring characteristics of
outgoing and network connections
incoming packets traversing.
Application
Proxy Firewall
CKT level
That controls input, Firewall
output, and/or access
from, to, or by an Acts as a session
application or service. layer
Honeypot

IDS technique use to Decoy to lure the cyber


study hacker attacks
movement

Cockoo’s Egg The virtual system


should look real as
possible as needed
Honeypot Types

Production Honeypot
Used to protect organization
and your network

Research Honeypot
Used to protect military or
government
related
Working of honeypot

01 Fake information is setup.

02 Deliberately making setup highly attractive for


hackers.

03 The setup is inbuilt by tracking tools for recording


hackers each an every activities.

04 Inshort used for prevention , detection &


information gathering.
Main difference between Firewall & Honeypot
THANK YOU

You might also like