Lec 3
Lec 3
Lec. 3
The computing devices are the portal to your online life, storing a
lot of your personal data. Therefore, it’s important to protect the
security of our devices.
• At its most basic, a firewall is essentially the barrier that sits between a
private internal network and the public Internet to detect the threats.
packets that come are filtered and matched with rules that
have previously been made in building a firewall.
If the data is suitable, then the data can be received and vice
versa if it does not match the rules, then the data is rejected.
Packet filtering firewalls Cont.
Pros of Packet filtering firewalls
• A low-cost solution.
• Fast packet filtering and processing.
• Excellent at screening traffic between internal
departments.
• Low resource consumption.
• Minimal impact on network speed and end-user
experience.
• Enables complex security policies through filtering on
packet headers.
• An excellent first line of defense in a multi-layered
firewall strategy
Packet filtering firewalls Cont.
It maintains records of all connections passing through it and can determine if a packet
is either the start of a new connection, a part of an existing connection, or is an invalid
packet.
Monitors the active status of the connection, then the information obtained will be used
to determine whether a network packet can penetrate the firewall.
Stateful inspection firewalls maintain a table database that tracks all open connections
and enables the system to check existing traffic streams. This database stores all key
packet-related info, including:
• The source IP.
• Source port.
• Destination IP.
• Destination port for each connection.
Stateful inspection Firewalls Cont.
Pros of stateful inspection firewalls:
• Consider previously inspected packets while filtering
traffic.
• Do not open numerous ports to allow traffic in or out, which
shrinks the attack surface.
• Detailed logging capabilities that help in digital forensics.
• Reduced exposure to port scanners.
Cons of stateful inspection firewalls:
• More expensive than packet-filtering firewalls.
• Require a high degree of skill to set up correctly.
• Often take a toll on performance and lead to network
latency.
3- Circuit-Level Gateways
27
Firewalls
Some Software Firewalls
Zone Alarm
Microsoft Widows Firewall
MacAfee Security Suite
Norton Security Suite
Some Hardware Firewall vendors
Dlink
Linksys
CISCO
Protection of Computing Devices Cont.
Sources:
• Executes malicious code via user actions (email attachment)
• inserting USB drives
• Configuration errors (e.g., weak passwords)
• Physical access to computer
Consequences:
• Once installed, viruses can destroy your data and slow down your computer. They
can even take over your computer and broadcast spam emails using your account.
• Spyware can monitor your online activities, collect your personal information or
produce unwanted pop-up ads on your web browser while you are online.
Solution:
Install antivirus and antispyware.
Antivirus and Antispyware for data protection
Cont.
Antivirus and Antispyware for data protection
Cont.
Tips for installing antivirus and Antispyware
• Download software from trusted websites. However, you
should always use antivirus software to provide another layer
of protection.
.
Using Antispyware
there are basically two types of antispyware products available:
1- Antispyware that finds and removes spyware after it has been
installed
2- Antispyware that blocks spyware when it is trying to install
itself (Real time prevention Antispyware).
Both of these methods stand a better chance of keeping
computers free from spyware when they are combined with user
information about how to avoid spyware.
Detect and Remove Antispyware
• The detect-and-remove method
is by far the simpler type of
antispyware product to write.
Therefore, there are several
commercially available
products that use this method.
Like antivirus software
packages, this type of
antispyware product relies on
databases of existing definitions
to recognize spyware threats.
• These databases must be
updated frequently to recognize
new spyware versions that have
been identified.
Real time prevention Antispyware