Page 174 - DCAP516_COMPUTER_SECURITY
P. 174

Computer Security




                    Notes              \Standard Profile
                                        \Windows Firewall: Define port exceptions
                                   To configure this policy, add the following string to the Show Contents dialog box for the
                                   policy:
                                   80:TCP:localsubnet:enabled:Web Server (TCP 80)




                                      Task  Try configuring windows XP firewall setting manually using any of the techniques
                                     described above.

                                   Self Assessment

                                   Fill in the blanks:

                                   5.  …………………………….. provide a more active form of security by either encrypting or
                                       encapsulating data for transmission through an unsecured network.
                                   6.  …………………………………………. firewalls tend to be very fast and tend to be very
                                       transparent to users.
                                   7.  ……………………………. firewalls can even permit return traffic from a server which is
                                       not explicitly permitted by the firewall’s ruleset.
                                   8.  ………....................... systems are more flexible than rules based systems.
                                   9.  ………………………………… firewalls can watch traffic streams from end to end.

                                   13.5 Summary


                                       A firewall is a software program or device that monitors, and sometimes controls, all
                                       transmissions between an organization’s internal network and the Internet.
                                       However large the network, a firewall is typically deployed on the network’s edge to
                                       prevent inappropriate access to data behind the firewall.
                                       The firewall ensures that all communication in both directions conforms to an
                                       organization’s security policy.

                                   13.6 Keywords


                                   Computer Security: It is a technological and managerial procedures applied to computer systems
                                   to ensure the availability, integrity and confidentiality of information managed by the computer
                                   system.
                                   Firewall: It is a dedicated appliance, or software running on another computer, which inspects
                                   network traffic passing through it, and denies or permits passage based on a set of rules.
                                   Proxy Server: It is a server (a computer system or an application program) that services the
                                   requests of its clients by forwarding requests to other servers.

                                   Virtual Private Network (VPN):  It is a network that uses a public telecommunication
                                   infrastructure, such as the Internet, to provide remote offices or individual users with secure
                                   access to their organization’s network.






          168                               LOVELY PROFESSIONAL UNIVERSITY
   169   170   171   172   173   174   175   176   177   178   179