Sand Box Technology
#1

Presented by:
Bhabagrahi jena

[attachment=10703]
Learning Objectives
List and define the two categories of firewalls
Explain why desktop firewalls are used
Explain how enterprise firewalls work
Enterprise versus Desktop Firewalls
Enterprise firewall
 Protects entire network or a network segment
 Can be a separate hardware appliance or software-only
Desktop firewall
 Software-only firewall intended to be installed on one client computer on the network and provide protection only to that device
 Also known as a personal firewall
Enterprise Firewall
Desktop Firewalls

Have generally replaced hardware firewalls for protection of a single device
Intercept and inspect all data that enters or leaves the computer
Traffic can generally be blocked by IP address, port address, or application
Protects against rogue access points and worms
Rogue Access Point
Help protect network by providing additional level of security at each network device
Recent increase in popularity
Popular desktop firewalls
 Tiny Personal Firewall
 Sygate Personal Firewall
 ZoneAlarm
Tiny Personal Firewall
Unique for advanced security features
Based on a technology certified by ICSA
Made up of several different “engines”
Includes an Intrusion Detection System (IDS) engine
Uses sandbox technology to create a closed environment around an application and restrict access to resources
Firewall Engine
Performs stateful packet inspection
Filters network activity based on TCP/IP protocol
Supports rules that page link to specific applications (Application Filter)
Ensures that an application program on the computer is the real program and not a Trojan horse
 Creates and checks MD5 signatures (checksums) of application programs
Tiny Personal Firewall Engine
Checksums
IDS Engine Report
Sandbox Technology
Protects resources
 Device drivers
 Registry database that contains all configurations of the computer
 File system
Shields and constantly monitors application programs to protect privacy and integrity of the computer system
Sandbox Technology
Protects against active content programs being used to perform:
 Theft of information and data
 Remote access via Internet
 Manipulation of communication
 Deletion of files
 Denial of service
Tiny Personal Firewall Sandbox
Sandbox Objects
Sygate Firewalls
Protect corporate networks and desktop systems from intrusion
Prevent malicious attackers from gaining control of corporate information network
Range in design from enterprise-based security systems to personal firewall systems
 Secure Enterprise
 Personal Firewall Pro
Sygate Secure Enterprise
Top-of-the-line product that combines protection with centralized management
Made up of Sygate Management Server (SMS) and Sygate Security Server
 SMS enables security managers to create a global security policy that applies to all users and groups
 Subgroups can be created within the global group
Can produce detailed reports of firewall’s actions
Sygate Management Server
Sygate Personal Firewall Pro

Designed for business users but lacks centralized management features
Provides in-depth low-level tools for protecting computers from a variety of attacks
Blocks or allows specific services and applications instead of restricting specific TCP network ports
Fingerprinting system ensures that an application program is the real program and not a Trojan horse
Provides flexibility over rules that govern the firewall
Contains other features not commonly found on most desktop firewall products (eg, testing and connection)
Protects against MAC and IP spoofing
Sygate Personal Firewall Pro
Bi-directional; provide protection from incoming and outgoing traffic
Pop-up windows alert users to intrusion attempts
Four interlocking security services
 Firewall
 Application Control
 Internet Lock
 Zones
ZoneAlarm Firewall
Uses fingerprints to identify components of a program as well as the program itself
 Prevents malicious code from gaining control of computer
Stops potentially malicious active content
ZoneAlarm Firewall
Application Control
 Allows users to decide which applications can or cannot use the Internet
Internet Lock
 Blocks all Internet traffic while computer is unattended or while Internet is not being used
Zones
 Monitors all activities on the computer; sends an alert when a new application tries to access the Internet
Internet Lock Settings
Zone Security
ZoneAlarm Logging Options
Enterprise Firewalls
Still perform bulk of the work in protecting a network
First line of defense in a security management plan
Provide “perimeter security”
Allow security managers to log attacks that strike the network
Popular Enterprise Firewall Products
Linksys firewall/router
Microsoft Internet Security and Acceleration (ISA) server
Reply
#2
i need a report and ppt for the seminar on the topic sandboxing
Reply
#3
To get more information about the topic "Sand Box Technology " please refer the page link below

http://studentbank.in/report-sand-box-te...?pid=52160
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sand box technology ppt download, box shiffting, sandbox, green it box, ppt on smart box technology, pneumatic sand filter, linksys 54,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  LAMP TECHNOLOGY (LINUX,APACHE,MYSQL,PHP) seminar class 1 3,480 04-04-2018, 04:11 PM
Last Post: Guest
  5 Pen PC Technology project topics 95 98,913 21-08-2015, 11:18 PM
Last Post: Guest
  Jini Technology computer science crazy 10 13,679 19-08-2015, 01:36 PM
Last Post: seminar report asees
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 8,509 12-09-2013, 08:28 PM
Last Post: Guest
Question 4g wireless technology (Download Full Report ) computer science crazy 35 33,952 15-03-2013, 04:10 PM
Last Post: computer topic
  FACE RECOGNITION TECHNOLOGY A SEMINAR REPORT Computer Science Clay 25 35,370 14-01-2013, 01:07 PM
Last Post: seminar details
  TWO WAY STUDENT INFORMATION SYSTEM USING CELLULAR TECHNOLOGY smart paper boy 3 3,483 24-12-2012, 11:24 AM
Last Post: seminar details
  TOUCH SCREEN TECHNOLOGY seminar projects crazy 1 3,283 06-12-2012, 12:12 PM
Last Post: seminar details
  Brain finger printing technology seminar projects crazy 43 48,184 05-12-2012, 02:41 PM
Last Post: seminar details
Photo Cybereconomy : Information Technology and Economy computer science crazy 1 2,765 23-11-2012, 01:00 PM
Last Post: seminar details

Forum Jump: