Internet Security and Firewall
Internet Security and Firewall
A STUDY ON
INTERNET SECURITY AND FIREWALL
MICRO PROJECT REPORT
Submitted in Nov 2023 by the group of 1 student
CERTIFICATES
Seal of
institute
INTERNET SECURITY AND FIREWALL
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network security has a wide range of applications and most
of the applications need ample security and access to the network should be
restricted from intruders and anomalies. Firewalls can be considered as the best
choice this process and in general the firewalls provide some access restrictions
to the incoming and outgoing traffic across a network.
Internet Security
Internet security is a branch of computer security specifically related to not
only Internet, often involving browser security and the World Wide Web, but
also network security as it applies to other applications or operating systems as a
whole. Its objective is to establish rules and measures to use against attacks over
the Internet.[1] The Internet represents an insecure channel for exchanging
information, which leads to a high risk of intrusion or fraud, such as phishing,
online viruses, Trojans, worms and more.
Malicious software
An internet user can be tricked or forced into downloading software that is
of malicious intent onto a computer. Such software comes in many forms, such as
viruses, Trojan horses, spyware, and worms.
Denial-of-service attacks
A denial-of-service attack (Do’s attack) or distributed denial-of service
attack (Didoes attack) is an attempt to make a computer resource unavailable to
its intended users. Another way of understanding Dados is seeing it as attacks in
cloud computing environment that are growing due to the essential characteristics
of cloud computing.[4] Although the means to carry out, motives for, and targets
of a DoS attack may vary, it generally consists of the concerted efforts to prevent
an Internet site or service from functioning efficiently or at all, temporarily or
indefinitely.
a) The first among the components is the <Internet Access Security Policy= of an
organization. This means that when the organization is connecting to the internet
what was the expected level of security at high level. Without depending on the
equipment that are used the security policy must have a life time because it is not
based on the techniques and the technology that is implemented (Government of
the Hong Kong, 2009). According to this statement, an instance for this type of
security policy is a corporate network of an organization is not accessed by the
external users that means they are not permitted use that network if not they have
unauthorized authentication. If an organization require transferring its corporate
information through the internet and if that information is not available in the
public domain then the information is transferred in a confidential approach. And
all the other external services will be banned and only the corporate users are
permitted to send e-mails across the internet.
b) The other component in making the firewalls is mapping of the security policy
on the procedures and technical designs, these procedures and technical designs
on which the security policy is mapped must be followed and implemented while
connecting to the internet. During this process the configuration of the system
will be changed and the information will be added as a fresh technology and so
on. The usage of one-time passwords can be taken as example for the technical
design considering the authentication of an organizational network. Generally the
technical designs depends on one security policy among the two polices. The two
policies are allowing any service except it is denied expressly or deny any service
except it is permitted expressly. The second one is the most secure among the
two security policies.
c) The third one is firewall system which is a combination of both software and
hardware that means the both the software and hardware components can make
the firewall. Generally a firewall system is made up of an <IP packet filtering
router= and a host computer sometimes it is also called as application gateway or
a bastion host which will run authentication software and application filtering.
All the above components are very important and necessary for making a
firewall. A firewall is said to be not configured properly if there is no Internet
access security policy. There is no value for the policy if that is not configured
properly and also if is not enforced with worthy
procedures.
FIREWALLS TYPES
Packet filter
The first reported type of network firewall is called a packet filter, which
inspect packets transferred between computers. The firewall maintains an access
control list which dictates what packets will be looked at and what action should
be applied, if any, with the default action set to silent discard. Three basic actions
regarding the packet consist of a silent discard, discard with Internet Control
Message Protocol or TCP reset response to the sender, and forward to the next
hop. Packets may be filtered by source and destination IP addresses, protocol,
source and destination ports. The bulk of Internet communication in 20th and
early 21st century used either Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP) in conjunction with well-known ports, enabling
firewalls of that era to distinguish between specific types of traffic such as web
browsing, remote printing, email transmission, file transfer.
The first paper published on firewall technology was in 1987 when
engineers from Digital Equipment Corporation (DEC) developed filter systems
known as packet filter firewalls. At AT&T Bell Labs, Bill Cheswick and Steve
Beloved continued their research in packet filtering and developed a working
model for their own company based on their original first-generation architecture.
Connection tracking
From 1989–1990, three colleagues from AT&T Bell Laboratories, Dave
Presotto, Jamadar Sharma, and Kshitij Nigam, developed the second generation
of firewalls, calling them circuit-level gateways.
Second-generation firewalls perform the work of their first generation
predecessors but also maintain knowledge of specific conversations between
endpoints by remembering which port number the two IP addresses are using at
layer 4 (transport layer) of the OSI model for their conversation, allowing
examination of the overall exchange between the node]s.