Page 174 - DCAP516_COMPUTER_SECURITY
P. 174
Computer Security
Notes \Standard Profile
\Windows Firewall: Define port exceptions
To configure this policy, add the following string to the Show Contents dialog box for the
policy:
80:TCP:localsubnet:enabled:Web Server (TCP 80)
Task Try configuring windows XP firewall setting manually using any of the techniques
described above.
Self Assessment
Fill in the blanks:
5. …………………………….. provide a more active form of security by either encrypting or
encapsulating data for transmission through an unsecured network.
6. …………………………………………. firewalls tend to be very fast and tend to be very
transparent to users.
7. ……………………………. firewalls can even permit return traffic from a server which is
not explicitly permitted by the firewall’s ruleset.
8. ………....................... systems are more flexible than rules based systems.
9. ………………………………… firewalls can watch traffic streams from end to end.
13.5 Summary
A firewall is a software program or device that monitors, and sometimes controls, all
transmissions between an organization’s internal network and the Internet.
However large the network, a firewall is typically deployed on the network’s edge to
prevent inappropriate access to data behind the firewall.
The firewall ensures that all communication in both directions conforms to an
organization’s security policy.
13.6 Keywords
Computer Security: It is a technological and managerial procedures applied to computer systems
to ensure the availability, integrity and confidentiality of information managed by the computer
system.
Firewall: It is a dedicated appliance, or software running on another computer, which inspects
network traffic passing through it, and denies or permits passage based on a set of rules.
Proxy Server: It is a server (a computer system or an application program) that services the
requests of its clients by forwarding requests to other servers.
Virtual Private Network (VPN): It is a network that uses a public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with secure
access to their organization’s network.
168 LOVELY PROFESSIONAL UNIVERSITY