Dire Dawa University: College of Computing Department of Computer Science
Dire Dawa University: College of Computing Department of Computer Science
COLLEGE OF COMPUTING
GROUP ASSIGNEMENT
Prepared By:
Name ID
1. Abel Kidane E/704/11
2. Leoul Tewodros E/730/11
3. Michael Tolera E/735/11
4. Nikodimos Endashaw E/740/11
5. Tesfa Simachew E/745/11
Hardware Firewalls
Software Firewalls
Firewall filters keep harmful data outside your computer. Some of the top
risks from which firewalls protect your computer include backdoors,
denial-of-service (DoS) attacks, macros, remote logins, spam, and viruses.
Backdoors are “doorways” to applications with vulnerabilities that
attackers exploit to get inside. This includes operating systems that may have
bugs that hackers can use to gain access to your computer.
DoS attacks are executed when a hacker requests permission to connect
to a server, and when the server responds, it cannot find the system that
made the request. When this is done again and again, the server gets flooded
and has to expend so much power to deal with the mass of requests,
rendering it unable to meet the needs of legitimate visitors. In some cases, the
server has to come offline completely. There are some firewalls that can
check whether the connection requests are legitimate, and thus, protect your
network from DoS attacks.
Macros refer to scripts run by applications to automate processes. A
macro can contain a series of dependent steps that are all launched by one
command. Hackers design or purchase macros intended to work within
certain applications. A macro can be hidden inside seemingly innocent data,
and once it enters your computer, it wreaks havoc on your system. A firewall
can detect malicious macros as it examines the packets of data that attempt
to pass through.
Remote logins are often used to help someone with a computer issue.
However, in the hands of the wrong person, they can be abused, particularly
because remote logins provide nearly complete access to your system.
Spam can sometimes include links to malicious websites. These types of
sites activate malicious code that forces cookies onto a computer. The
cookies create backdoors for hackers to gain access to the computer.
Preventing a spam attack is often as simple as not clicking on anything
suspicious in an email, regardless of who the sender appears to be. A firewall
can inspect your emails and prevent your computer from getting infected.
Viruses, once on a computer, copy themselves and spread to another
device on the network. Viruses can be used to do a variety of things, ranging
from relatively harmless activity to erasing data on your computer. Firewalls
can inspect data packets for viruses, but it is better to use antivirus software
in conjunction with a firewall to maximize your security.
Five types of firewall include the following:
- packet filtering firewall
- circuit-level gateway
- application-level gateway (aka proxy firewall)
- stateful inspection firewall
- next-generation firewall (NGFW)
Firewall devices and services can offer protection beyond standard
firewall function. For example, by providing an intrusion detection or
prevention system (IDS/IPS), denial-of-service (DoS) attack protection,
session monitoring, and other security services to protect servers and other
devices within the private network. While some types of firewalls can work as
multifunctional security devices, they need to be part of a multilayered
architecture that executes effective enterprise security policies.
NAT
NAT stands for network address translation. It’s a way to map multiple
local private addresses to a public one before transferring the information.
Organizations that want multiple devices to employ a single IP address use
NAT, as do most home routers.
Types of NAT are three different types of NATs. People use them for different
reasons, but they all still work as a NAT.
1. Static NAT:- When the local address is converted to a public one, this NAT
chooses the same one. This means there will be a consistent public IP
address associated with that router or NAT device.
2. Dynamic NAT:- Instead of choosing the same IP address every time, this
NAT goes through a pool of public IP addresses. This results in the router or
NAT device getting a different address each time the router translates the
local address to a public address.
3. PAT:- stands for port address translation. It’s a type of dynamic NAT, but it
bands several local IP addresses to a singular public one. Organizations that
want all their employees’ activity to use a singular IP address use a PAT, often
under the supervision of a network administrator.
Proxies provide a valuable layer of security for your computer. They can
be set up as web filters or firewalls, protecting your computer from internet
threats like malware. This extra security is also valuable when coupled with a
secure web gateway or other email security products. This way, you can filter
traffic according to its level of safety or how much traffic your network or
individual computers can handle.
- Improve security
- Secure employees internet activity from people trying to snoop on them
- Balance internet traffic to prevent crashes
- Control the websites employees and staff access in the office
- Save bandwidth by caching files or compressing incoming traffic
Caching proxy