0% found this document useful (0 votes)
226 views23 pages

Internet Security and Firewall

This document is a micro project report on internet security and firewalls submitted by student PINIL BABURAV CHAKAR. It discusses the rationale for computer and network security and restricting access. The aim is to explain internet security and firewalls. It reviews literature on firewall origins and types. The methodology covers internet security threats like malware, denial of service attacks, and network layer security protocols. It also explains firewall components like security policies, technical designs, and the combination of software and hardware.

Uploaded by

chakarpinil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views23 pages

Internet Security and Firewall

This document is a micro project report on internet security and firewalls submitted by student PINIL BABURAV CHAKAR. It discusses the rationale for computer and network security and restricting access. The aim is to explain internet security and firewalls. It reviews literature on firewall origins and types. The methodology covers internet security threats like malware, denial of service attacks, and network layer security protocols. It also explains firewall components like security policies, technical designs, and the combination of software and hardware.

Uploaded by

chakarpinil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Subject name and code: OSY (22516) Academic Year: 2023-24

Couse Name: IF5I Semester: Fifth

A STUDY ON
INTERNET SECURITY AND FIREWALL
MICRO PROJECT REPORT
Submitted in Nov 2023 by the group of 1 student

Sr. Roll No. Full Name of Students Enrollment Seat No.


No. (sem-5) No. (semester-5)

1 53 PINIL BABURAV CHAKAR 2209350316

Under the Guidance of


PROF. MS. SHEETAL DESHMUKH
In
Diploma Board of Technical Education,
ISO 9001:2008 (ISO/IEC-27001:201
SHIVAJIRAO S. JONDHALE POLYTECHNIC, ASANGOAN
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION, MUMBAI

CERTIFICATES

This is to certify that Mr. PINIL BABURAV CHAKAR Roll No: 53 of


Fifth Semester of Information Technology Programme in Engineering &
Technology at Shivajirao. S Jondhale Polytechnic Asangaon (EAST) Shahapur
421601 has completed the Micro Project Satisfactorily in Subject: OSY
In the academic Year 2023 as prescribed curriculum of I Scheme.

Place: ASANGOAN Enrollment No: 2209350316


Date: / /2023 Exam Seat No: 138775

Project Guide Head of Department Principal

Seal of
institute
INTERNET SECURITY AND FIREWALL

1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need ample
security and access to
the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and in
general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
1.0 Rationale
Computer and network security has a wide range of applications and most
of the applications need ample security and access to the network should be
restricted from intruders and anomalies. Firewalls can be considered as the best
choice this process and in general the firewalls provide some access restrictions
to the incoming and outgoing traffic across a network.

2.0 Aim /Benefits


The aim of this Micro project is to perform the about the project is Internet
Security and firewall

3.0 Course Outcomes Achieved


a) Operate & Install operating system and configure it.
b) Explain the use of operating system tools to perform various functions.
c) Execute process commands for performing process management
operations.
d) Test different scheduling algorithms to calculate turnaround time and
average waiting time.
e) Test and calculate efficiency of different memory management
techniques and Use of file management techniques.

4.0 Literature Review

The term firewall originally referred to a wall intended to confine a


fire within a line of adjacent buildings. Later uses refer to similar
structures, such as the metal sheet separating the engine compartment of a
vehicle or aircraft from the passenger compartment. The term was applied
in the late 1980s to network technology that emerged when the Internet
was fairly new in terms of its global use and connectivity. The
predecessors to firewalls for network security were routers used in the late
1980s. Because they already segregated networks, routers could apply
filtering to packets crossing them.

5.0 Actual Methodology followed

Internet Security
Internet security is a branch of computer security specifically related to not
only Internet, often involving browser security and the World Wide Web, but
also network security as it applies to other applications or operating systems as a
whole. Its objective is to establish rules and measures to use against attacks over
the Internet.[1] The Internet represents an insecure channel for exchanging
information, which leads to a high risk of intrusion or fraud, such as phishing,
online viruses, Trojans, worms and more.

Malicious software
An internet user can be tricked or forced into downloading software that is
of malicious intent onto a computer. Such software comes in many forms, such as
viruses, Trojan horses, spyware, and worms.

Denial-of-service attacks
A denial-of-service attack (Do’s attack) or distributed denial-of service
attack (Didoes attack) is an attempt to make a computer resource unavailable to
its intended users. Another way of understanding Dados is seeing it as attacks in
cloud computing environment that are growing due to the essential characteristics
of cloud computing.[4] Although the means to carry out, motives for, and targets
of a DoS attack may vary, it generally consists of the concerted efforts to prevent
an Internet site or service from functioning efficiently or at all, temporarily or
indefinitely.

Network layer security


TCP/IP protocols may be secured with cryptographic methods and
security protocols. These protocols include Secure Sockets Layer (SSL),
succeeded by Transport Layer Security (TLS) for web traffic, Pretty Good
Privacy (PGP) for email, and IPsec for the network layer security.

Internet Protocol Security (IPsec)


IPsec is designed to protect TCP/IP communication in a secure manner. It
is a set of security extensions developed by the Internet Task Force (IETF). It
provides security and authentication at the IP layer by transforming data using
encryption. Two main types of transformation that form the basis of IPsec: the
Authentication Header (AH) and ESP. These two protocols provide data
integrity, data origin authentication, and interplay service. These protocols can be
used alone or in combination to provide the desired set of security services for
the Internet Protocol (IP) layer.
Firewall

a) The first among the components is the <Internet Access Security Policy= of an
organization. This means that when the organization is connecting to the internet
what was the expected level of security at high level. Without depending on the
equipment that are used the security policy must have a life time because it is not
based on the techniques and the technology that is implemented (Government of
the Hong Kong, 2009). According to this statement, an instance for this type of
security policy is a corporate network of an organization is not accessed by the
external users that means they are not permitted use that network if not they have
unauthorized authentication. If an organization require transferring its corporate
information through the internet and if that information is not available in the
public domain then the information is transferred in a confidential approach. And
all the other external services will be banned and only the corporate users are
permitted to send e-mails across the internet.

b) The other component in making the firewalls is mapping of the security policy
on the procedures and technical designs, these procedures and technical designs
on which the security policy is mapped must be followed and implemented while
connecting to the internet. During this process the configuration of the system
will be changed and the information will be added as a fresh technology and so
on. The usage of one-time passwords can be taken as example for the technical
design considering the authentication of an organizational network. Generally the
technical designs depends on one security policy among the two polices. The two
policies are allowing any service except it is denied expressly or deny any service
except it is permitted expressly. The second one is the most secure among the
two security policies.

c) The third one is firewall system which is a combination of both software and
hardware that means the both the software and hardware components can make
the firewall. Generally a firewall system is made up of an <IP packet filtering
router= and a host computer sometimes it is also called as application gateway or
a bastion host which will run authentication software and application filtering.
All the above components are very important and necessary for making a
firewall. A firewall is said to be not configured properly if there is no Internet
access security policy. There is no value for the policy if that is not configured
properly and also if is not enforced with worthy
procedures.

FIREWALLS TYPES

Packet filter
The first reported type of network firewall is called a packet filter, which
inspect packets transferred between computers. The firewall maintains an access
control list which dictates what packets will be looked at and what action should
be applied, if any, with the default action set to silent discard. Three basic actions
regarding the packet consist of a silent discard, discard with Internet Control
Message Protocol or TCP reset response to the sender, and forward to the next
hop. Packets may be filtered by source and destination IP addresses, protocol,
source and destination ports. The bulk of Internet communication in 20th and
early 21st century used either Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP) in conjunction with well-known ports, enabling
firewalls of that era to distinguish between specific types of traffic such as web
browsing, remote printing, email transmission, file transfer.
The first paper published on firewall technology was in 1987 when
engineers from Digital Equipment Corporation (DEC) developed filter systems
known as packet filter firewalls. At AT&T Bell Labs, Bill Cheswick and Steve
Beloved continued their research in packet filtering and developed a working
model for their own company based on their original first-generation architecture.

Connection tracking
From 1989–1990, three colleagues from AT&T Bell Laboratories, Dave
Presotto, Jamadar Sharma, and Kshitij Nigam, developed the second generation
of firewalls, calling them circuit-level gateways.
Second-generation firewalls perform the work of their first generation
predecessors but also maintain knowledge of specific conversations between
endpoints by remembering which port number the two IP addresses are using at
layer 4 (transport layer) of the OSI model for their conversation, allowing
examination of the overall exchange between the node]s.

6.0 Actual Resource Used

Sr Name of Resource / Specification Qty. Remarks


No. Material
1) Laptop Intel (R) Core i5- 4GB 1 -
RAM
2) Operating System Windows 10 1 -
7.0 Output of This Micro-Project-
• Internet security and firewall

8.0 Skill Developed/Learning Outcome of this Micro-Project :-

1) Learn about Internet Security and firewalls.


2) Understand the basic types of internet security.
9.0 Applications of this Micro-Project

1. An application-level gateway acts as a relay node for the application


level traffic. They intercept incoming and outgoing packets, run proxies
that copy and forward information across the gateway, and function as a
proxy server, preventing any direct connection between a trusted server or
client and an untrusted host.

2. A firewall is a network security device that monitors incoming and


outgoing network traffic and decides whether to allow or block specific
traffic based on a defined set of security rules.
Online quiz management using
java
Samarth Polytechnic ,Belhe
Page 30
CHAPTER 8
REFERENCES
1.Patil,PratekandKarlMoss,201
7,JavaDatabaseProgrammingw
ithJDBC,CoriclisGroupBooks
. 2.
Sierra,KathyandBertBates,200
3,HeadFirstJava,O‟Reilly
. 3.
Sarcar,Vaskaran,2018,JavaDesi
gnPatterns,Apress.
4.
http://www.javaworld.com/java
world/jw-01-1998/jw-01-
credentialreveiw.html
5. http://jdbc-tutorial.com
6.
https://www.tutorialspoint.com
/java
7.
http://www.javapoint.com/java
-tutorial
8.
https://docs.oracle.com/javase/t
utorial

thank you !!!


1.0 Rationale
Computer and network
security has a wide
range of applications
and most of the
applications need
ample security and
access to the
network should be
restricted from intruders
and anomalies. Firewalls
can
be considered as the best
choice this process and
in general the firewalls
provide some access
restrictions to the
incoming and outgoing
traffic
across a network.
2.0 Aim /Benefits
The aim of this Micro
project is to perform the
about the project is
Internet Security and
firewall
3.0 Course Outcomes
Achieved
a) Operate & Install
operating system and
configure it.
b) Explain the use of
operating system tools to
perform various
functions.
c) Execute process
commands for
performing process
management
operations.
d) Test different
scheduling algorithms to
calculate turnaround
time and
average waiting time.
e) Test and calculate
efficiency of different
memory management
techniques and Use of
file management
techniques.
4.0 Literature Review
The term firewall
originally referred to a
wall intended to confine
a
fire within a line of
adjacent buildings.
Later uses refer to
similar
structures, such as the
metal sheet separating
the engine compartment
of a
vehicle or aircraft from
the passenger
compartment. The term
was applied
in the late 1980s to
network technology that
emerged when the
Internet
was fairly new in
terms of its global use
and connectivity. The
predecessors to firewalls
for network security
were routers used in the
late
1980s. Because they
already segregated
networks, routers could
apply
filtering to packets
crossing them.

You might also like