Firewalls and Proxy
Servers
Presented By
Name :Ayan Das
RollNo: 25300121057
Branch: CSE
Semester: 8th
Paper Name: Cryptography and Network
Security
Paper Code: PEC-CS801B
Content
• Introduction
• Body
• Conclusion
• References
Introduction
Firewall
 A computer firewall is a router or other communications device which
filters access to a protected network.
 Firewall is also a program that screens all incoming traffic and
protects the network from unwelcome intruders.
Proxy Server
 Proxy Server is a computer program that acts as an intermediary
between a web browser and a web server. To give users rapid access
to popular web destinations.
 Internet Service Providers use proxy servers as "holding bins" to store
frequently requested pages, rather than going out and fetching them
repeatedly from the Net
Body
• A proxy firewall is considered the most secure form of firewall because it prevents networks
from directly contacting other systems. It has its own Internet Protocol (IP) address, which
means an external network connection cannot receive packets directly from the network.
• A proxy firewall works by providing a single point that enables organizations to assess the
threat level of application protocols and implement attack detection, error detection, and
validity checks. It uses tactics like deep packet inspection (DPI) and proxy-based architecture
to analyze application traffic and discover advanced threats.
Conclusion
• A firewall not only reduces the risks to the internal network, it can provide enhanced
privacy to not allowing services such as finger and the Domain Name Service. In addition,
a firewall can be used log access to and from the internal network, and to keep statistics
about network usage. As the Internet becomes more a part of business, firewalls are
becoming an important ingredient of an overall network security policy.
• A proxy server is an intermediary between end users and the internet that offers benefits
such as: Improving security. Providing anonymity. Improving browsing speed. Allowing
for control over internet usage
References
• https://courses.cs.washington.edu/courses/csep561/97sp/paper1/paper09/#:~:text=A%20fir
ewall%20not%20only%20reduces,keep%20statistics%20about%20network%20usage.
• https://www.digitalguardian.com/blog/what-proxy-server-definition-how-it-works-
more#:~:text=Conclusion,Providing%20anonymity
• https://www.fortinet.com/resources/cyberglossary/proxy-
firewall#:~:text=It%20determines%20which%20traffic%20should,to%20unauthorized%20
parties%20and%20cyberattacks.
• https://www.geeksforgeeks.org/what-is-a-proxy-firewall/
• https://www.geeksforgeeks.org/introduction-of-firewall-in-computer-network/
Thank You

Firewalls and proxies are both use for security

  • 1.
    Firewalls and Proxy Servers PresentedBy Name :Ayan Das RollNo: 25300121057 Branch: CSE Semester: 8th Paper Name: Cryptography and Network Security Paper Code: PEC-CS801B
  • 2.
    Content • Introduction • Body •Conclusion • References
  • 3.
    Introduction Firewall  A computerfirewall is a router or other communications device which filters access to a protected network.  Firewall is also a program that screens all incoming traffic and protects the network from unwelcome intruders. Proxy Server  Proxy Server is a computer program that acts as an intermediary between a web browser and a web server. To give users rapid access to popular web destinations.  Internet Service Providers use proxy servers as "holding bins" to store frequently requested pages, rather than going out and fetching them repeatedly from the Net
  • 4.
    Body • A proxyfirewall is considered the most secure form of firewall because it prevents networks from directly contacting other systems. It has its own Internet Protocol (IP) address, which means an external network connection cannot receive packets directly from the network. • A proxy firewall works by providing a single point that enables organizations to assess the threat level of application protocols and implement attack detection, error detection, and validity checks. It uses tactics like deep packet inspection (DPI) and proxy-based architecture to analyze application traffic and discover advanced threats.
  • 5.
    Conclusion • A firewallnot only reduces the risks to the internal network, it can provide enhanced privacy to not allowing services such as finger and the Domain Name Service. In addition, a firewall can be used log access to and from the internal network, and to keep statistics about network usage. As the Internet becomes more a part of business, firewalls are becoming an important ingredient of an overall network security policy. • A proxy server is an intermediary between end users and the internet that offers benefits such as: Improving security. Providing anonymity. Improving browsing speed. Allowing for control over internet usage
  • 6.
    References • https://courses.cs.washington.edu/courses/csep561/97sp/paper1/paper09/#:~:text=A%20fir ewall%20not%20only%20reduces,keep%20statistics%20about%20network%20usage. • https://www.digitalguardian.com/blog/what-proxy-server-definition-how-it-works- more#:~:text=Conclusion,Providing%20anonymity •https://www.fortinet.com/resources/cyberglossary/proxy- firewall#:~:text=It%20determines%20which%20traffic%20should,to%20unauthorized%20 parties%20and%20cyberattacks. • https://www.geeksforgeeks.org/what-is-a-proxy-firewall/ • https://www.geeksforgeeks.org/introduction-of-firewall-in-computer-network/
  • 7.