Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Grade 10-12 - Week 5

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

LEARNING ACTIVITY SHEET IN COMPUTER SYSTEMS SERVICING 10/12

Quarter 2 – Week 5
Name of Learner: _____________________ Grade and Section: ________________
Date: ________________

COMPUTER SYSTEM SERVICING NC II ACTIVITY SHEET


FIREWALL CONFIGURATION
I. Learning Competency with Code
TLE_IACSS9-12SUCN-If-j-IIa-e-35
 3.5 Configure security/firewall/advanced settings in accordance with manufacturer’s instruction and
end-user preferences

II. Background Information for Learners


Connecting personal computers to other IT systems or the internet opens up a range of positive
possibilities — easy collaboration with others, combining of resources, enhanced creativity — but it
also exposes users to dangers.
Hacking, identity theft, malware, and online fraud are common threats users could face when they
expose themselves by linking their computers to a network or the internet.
FIREWALL
A firewall is a security device — computer hardware or software — that
can help protect your network by filtering traffic and blocking outsiders
from gaining unauthorized access to the private data on your computer.
Not only does a firewall block unwanted traffic, it can also help block
malicious software from infecting your computer.
Firewalls can provide different levels of protection. They key is https://www.hotspotshiel
determining how much protection you need. d.com/imgs/learn/what-
is-a-computer-
FIREWALLS ARE PART OF YOUR NETWORK SECURITY
Firewalls represent a first line of defense in home network security. firewall/pic.jpg
Your home network is only as secure as its least protected device. That’s where a network security
system comes in.
A firewall shouldn’t be your only consideration for securing your home network. It’s important to make
sure all of your internet-enabled devices — including mobile devices — have the latest operating
system, web browsers, and security software.

WHAT DOES A FIREWALL DO?


A firewall acts as a gatekeeper. It monitors attempts to gain access to your operating system and
blocks unwanted traffic or unrecognized sources.
A firewall acts as a barrier or filter between your computer and another network such as the internet.
You could think of a firewall as a traffic controller. It helps to protect your network and information by
managing your network traffic, blocking unsolicited incoming network traffic, and validating access by
assessing network traffic for anything malicious like hackers and malware.
HOW DOES A FIREWALL WORK?
To start, a firewalled system analyzes network traffic based on
rules. A firewall only welcomes those incoming connections that it Hardware Firewall vs.
has been configured to accept. It does this by allowing or blocking Software Firewall
specific data packets — units of communication you send over digital networks — based on pre-
established security rules.
TYPES OF FIREWALLS
Packet-filtering firewalls
A packet-filtering firewall is a management program that
can block network traffic IP protocol, an IP address, and a
port number. This type of firewall is the most basic form of
protection and is meant for smaller networks.
Stateful multi-layer inspection (SMLI) firewalls
The stateful multi-layer inspection firewall has standard
firewall capabilities and keeps track of established
connections. It filters traffic based on state, port, and
protocol, along with administrator-defined rules and context.
This involves using data from prior connections and
packets from the same connection.
Next-generation firewalls (NGFW)
Next-generation firewalls are more sophisticated than
packet-filtering and stateful inspection firewalls. Why? They have more levels of security, going
beyond standard packet-filtering to inspect a packet in its entirety. That means not just the
packet header, but also a packet’s contents and source. NGFW are able to block more
sophisticated and evolving security threats like advanced malware.
Network address translation (NAT) firewalls
A NAT firewall is able to assess internet traffic and block unsolicited communications. In other
words, it only accepts inbound web traffic if a device on your private network solicited it.
Host-based firewalls versus network-based firewalls
There are differences between host-based and network-based firewalls, along with benefits of
having both in place.
Network firewalls filter traffic going to and from the internet to secured local area networks (LAN).
They typically are used by businesses that need to protect a large network of computers,
servers, and employees. A network-based firewall is able to monitor communications between a
company’s computers and outside sources, as well as restrict certain websites, IP addresses, or
other services.
What are some of the main risks of not having a firewall?
You might already engage in certain safe computer and internet use practices, including these:
 You don’t click on unknown links or attachments.
 You only log on to trustworthy, known websites.
 You never give out any personal information unless it is absolutely necessary.
 You have strong, unique, complex passwords for each online account that you update often.
Does that make you safe enough? The answer may be “no.” If you use the internet, it’s smart to
have a firewall in place. Cyber threats are widespread and evolving. It’s important to use
available defences to help protect your network, and the personal information stored on your
computer, against cybercrimes.
Here are the three main risks of not having a firewall:
Open access
Without a firewall, you’re accepting every connection into your network from anyone. You
wouldn’t have any way to detect incoming threats that could leave your devices vulnerable to
malicious users.
Lost or compromised data
Not having a firewall could leave your devices exposed, which could allow someone to gain
control over your computer or network. Cybercriminals could delete your data. Or they could use
it to commit identity theft or financial fraud.
Network crashes
Without a firewall, attackers could shut down your network. Getting it running again, and
attempting to recover your stored data, could involve your time and money.
DESCRIBE AND COMPARE FIREWALL TYPES

Hardware and software firewalls protect data and equipment on a network from
unauthorized access. A firewall should be used in addition to security software.
Hardware and software firewalls have several modes for filtering network data traffic:
 Packet filter – This is a set of rules that allows or denies traffic based on criteria
such as IP addresses, protocols, or ports used.
 Proxy firewall – This is a firewall installed on a proxy server that inspects all traffic
and allows or denies packets based on configured rules. A proxy server is a server
that is a relay between a client and a destination server on the Internet.
 Stateful packet inspection – This is a firewall that keeps track of the state of
network connections traveling through the firewall. Packets that are not part of a
known connection are dropped.

Hardware Firewall
A hardware firewall is a physical filtering component that inspects data packets from the
network before they reach computers and other devices on a network. A hardware firewall is
a free-standing unit that does not use the resources of the computers it is protecting, so
there is no impact on processing performance.

Software Firewall
A software firewall is an application on a computer that
inspects and filters data packets. Windows Firewall is
an example of a software firewall that is included in the
Windows operating system. A software firewall uses
the resources of the computer, resulting in reduced
performance for the user
Software firewalls can be either an independent
application or part of the operating system. There are
several third-party software firewalls. There is also a
software firewall built into Windows 10.

III. Activity Proper

1. Activity: Blocking a Program/Application in Windows 10 Firewall


Instruction: Open your Computer or go an internet café nearby and open the link provided below.
Decide for a program/application to be blocked and follow the infographic procedure in
that page after opening the link.
http://bit.do/blocking-a-program

2. Exercises / Activities
2.1 Multiple Choice. Encircle the correct answer from the given choices below.
1. These are the common threats when linking your computer to a network or the internet,
except.
a. Hacking c. identity theft
b. cloud storage d. online fraud
2. The most basic form of protection and is meant for smaller networks.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls

3. More sophisticated than packet-filtering and stateful inspection firewalls.


a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls

4. This involves using data from prior connections and packets from the same connection.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls

5. The risk that attackers could shut down your network if without a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None

6. The risk that you’re accepting every connection into your network from anyone if without
a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None

7. This is a firewall that keeps track of the state of network connections traveling through
the firewall.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None

8. This is a set of rules that allows or denies traffic based on criteria such as IP addresses,
protocols, or ports used.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None

9. Multiple Computers can be protected in this type of firewall.


a. Proxy Firewall c. Software Firewall
b. Hardware Firewall d. Windows Defender Firewall

10. Refers to connections coming-in to a specific device (host/server) from a remote


location.
a. Open Access c. Outbound Connections
b. Packet Filter d. Inbound Connections

You might also like