Edu 03Anju 23 assignment.pdf

Assignment on firewall and antivirus

ASSIGNMENT
Submitted by
Anju Mohanan.U
Roll no.23
Physical science
PREVENTIVE MEASURES-
FIREWALL,ANTIVIRUS
SOFTWARE
Firewall
A firewall can be defined as a special type of network security device or a
software program that monitors and filters incoming and outgoing network traffic
based on a defined set of security rules. It acts as a barrier between internal private
networks and external sources (such as the public Internet).
The primary purpose of a firewall is to allow non-threatening traffic and prevent
malicious or unwanted data traffic for protecting the computer from viruses and
attacks. A firewall is a cybersecurity tool that filters network traffic and helps
users block malicious software from accessing the Internet in infected computers.
Firewall: Hardware or Software
This is one of the most problematic questions whether a firewall is a hardware or
software. As stated above, a firewall can be a network security device or a
software program on a computer. This means that the firewall comes at both
levels, i.e., hardware and software, though it's best to have both.
Each format (a firewall implemented as hardware or software) has different
functionality but the same purpose. A hardware firewall is a physical device that
attaches between a computer network and a gateway. For example, a broadband
router. On the other hand, a software firewall is a simple program installed on a
computer that works through port numbers and other installed software.
Apart from that, there are cloud-based firewalls. They are commonly referred to
as FaaS(firewall as a service). A primary advantage of using cloud-based
firewalls is that they can be managed centrally. Like hardware firewalls, cloud-
based firewalls are best known for providing perimeter security.
Why Firewall
Firewalls are primarily used to prevent malware and network-based attacks.
Additionally, they can help in blocking application-layer attacks. These firewalls
act as a gatekeeper or a barrier. They monitor every attempt between our
computer and another network. They do not allow data packets to be transferred
through them unless the data is coming or going from a user-specified trusted
source.
Firewalls are designed in such a way that they can react quickly to detect and
counter-attacks throughout the network. They can work with rules configured to
protect the network and perform quick assessments to find any suspicious
activity. In short, we can point to the firewall as a traffic controller.
Some of the important risks of not having a firewall are:
Open Access
If a computer is running without a firewall, it is giving open access to other
networks. This means that it is accepting every kind of connection that comes
through someone. In this case, it is not possible to detect threats or attacks coming
through our network. Without a firewall, we make our devices vulnerable to
malicious users and other unwanted sources.
Lost or Comprised Data
Without a firewall, we are leaving our devices accessible to everyone. This means
that anyone can access our device and have complete control over it, including
the network. In this case, cybercriminals can easily delete our data or use our
personal information for their benefit.
Network Crashes
In the absence of a firewall, anyone could access our network and shut it down.
It may lead us to invest our valuable time and money to get our network working
again.
Therefore, it is essential to use firewalls and keep our network, computer, and
data safe and secure from unwanted sources.
Brief History of Firewall
Firewalls have been the first and most reliable component of defense in network
security for over 30 years. Firewalls first came into existence in the late 1980s.
They were initially designed as packet filters. These packet filters were nothing
but a setup of networks between computers. The primary function of these packet
filtering firewalls was to check for packets or bytes transferred between different
computers.
Firewalls have become more advanced due to continuous development, although
such packet filtering firewalls are still in use in legacy systems.
As the technology emerged, Gil Shwed from Check Point
Technologies introduced the first stateful inspection firewall in 1993. It was
named as FireWall-1. Back in 2000, Netscreen came up with its purpose-built
firewall 'Appliance'. It gained popularity and fast adoption within enterprises
because of increased internet speed, less latency, and high throughput at a lower
cost.
The turn of the century saw a new approach to firewall implementation during
the mid-2010. The 'Next-Generation Firewalls' were introduced by the Palo Alto
Networks. These firewalls came up with a variety of built-in functions and
capabilities, such as Hybrid Cloud Support, Network Threat Prevention,
Application and Identity-Based Control, and Scalable Performance, etc. Firewalls
are still getting new features as part of continuous development. They are
considered the first line of defense when it comes to network security.
Working
A firewall system analyzes network traffic based on pre-defined rules. It then
filters the traffic and prevents any such traffic coming from unreliable or
suspicious sources. It only allows incoming traffic that is configured to accept.
Typically, firewalls intercept network traffic at a computer's entry point, known
as a port. Firewalls perform this task by allowing or blocking specific data packets
(units of communication transferred over a digital network) based on pre-defined
security rules. Incoming traffic is allowed only through trusted IP addresses, or
sources.
Functions of firewall
• Network Threat Prevention
• Application and Identity-Based Control
• Hybrid Cloud Support
• Scalable Performance
• Network Traffic Management and Control
• Access Validation
• Record and Report on Events
Types of Firewall
• Proxy Firewall
• Packet-filtering firewalls
• Stateful Multi-layer Inspection (SMLI) Firewall
• Unified threat management (UTM) firewall
• Next-generation firewall (NGFW)
• Network address translation (NAT) firewalls
Limitations of Firewall
• Firewalls cannot stop users from accessing malicious websites, making it
vulnerable to internal threats or attacks.
• Firewalls cannot protect against the transfer of virus-infected files or
software.
• Firewalls cannot prevent misuse of passwords.
• Firewalls cannot protect if security rules are misconfigured.
• Firewalls cannot protect against non-technical security risks, such as social
engineering.
• Firewalls cannot stop or prevent attackers with modems from dialing in to
or out of the internal network.
• Firewalls cannot secure the system which is already infected.
Antivirus
Antivirus software is a program(s) that is created to search, detect, prevent and
remove software viruses from your system that can harm your system. Other
harmful software such as worms, adware, and other threats can also be detected
and removed via antivirus. This software is designed to be used as a proactive
approach to cyber security, preventing threats from entering your computer and
causing issues. Most antivirus software operates in the background once installed,
providing real-time protection against virus attacks.
While you may believe that your computer is safe as long as you don’t visit
questionable websites, hackers have far more sophisticated methods of infecting
your computer, which is why you need a powerful antivirus to stay to secure your
data and system. The implications of a virus getting into your computer might be
fatal. Viruses can cause a wide range of malicious behavior. They can crash your
device, monitor your personal accounts, or spy on you through your webcam. So,
always use antivirus software.
How Antivirus Works:
Antivirus software works by comparing your computer applications and files to
a database of known malware kinds. Because hackers are continually creating and
disseminating new viruses, it will also check systems for the presence of new or
undiscovered malware threats. The antivirus checks files, programs, and
applications going in and out of your computer to its database to identify matches.
Similar and identical matches to the database are segregated, scanned, and
eliminated.
Most programs will employ three types of detection devices:
• Specific detection, which looks for known parts or types of malware or
patterns that are linked by a common codebase
• Generic detection is a type of detection that looks for known parts or
types of malware or patterns that are related to a common codebase.
• Heuristic detection is a type of virus detection that looks for unknown
infections by spotting suspicious file structures.
Examples of Antivirus:
The antivirus software is available in 2 types:
(i) Free: Free anti-virus software provides basic virus protection
(ii) Paid: commercial anti-virus software provides more extensive protection.
The following are some commonly used antivirus software:
1. Bitdefender: Bitdefender Total Security is a comprehensive security suite that
protects against viruses and dangerous malware of all varieties. This user-friendly
antivirus software is compatible with all four major operating systems and smart
homes, and it also includes a free VPN with a daily limit of 200MB, parental
controls, camera protection, a password manager, etc. This security suite is
reasonably priced and will protect up to five devices 24 hours a day, seven days
a week.
2. AVAST: This is a free antivirus available. All you have to do to obtain top-
notch protection on your computer, emails, downloads, and instant messages in
the free version is register (for free) once a year. It includes a sophisticated
heuristics engine that enables it to detect viruses.
3. Panda: It can detect viruses, trojans, spyware, adware, worms, and malware at
the same level as other antiviruses do. It is different from others because using
this software, when you scan your computer, it doesn’t consume any of your
computer’s resources; instead, it runs in the cloud, allowing your machine to
continue to function normally.
Advantages of Antivirus:
• Spam and advertisements are blocked: Viruses exploit pop-up
advertising and spam websites as one of the most common ways to infect
your computer and destroy your files. Antivirus acts against harmful virus-
infected adverts and websites by denying them direct access to your
computer network.
• Virus protection and transmission prevention: It identifies any possible
infection and then attempts to eliminate it.
• Hackers and data thieves are thwarted: Antivirus do regular checks to
see if there are any hackers or hacking-related apps on the network. As a
result, antivirus offers complete security against hackers.
• Protected against devices that can be detached: Antivirus scans all
removable devices for potential viruses, ensuring that no viruses are
transferred.
• To improve security from web, restrict website access: Antivirus
restricts your online access in order to prevent you from accessing
unauthorized networks. This is done to ensure that you only visit websites
that are safe and non-harmful to your computer.
• Password Protection: Using antivirus, you should consider using a
password manager for added security.
Disadvantages of Antivirus:
• Slows down system’s speed: When you use antivirus programs, you’re
using a lot of resources like your RAM and hard drive. As a result, the
computer’s overall speed may be significantly slowed.
• Popping up of Advertisements: Apart from commercial antivirus
applications, free antivirus must make money in some way. One approach
to attaining these is through advertising. Many times these advertisements
degrade the user experience by popping up every time.
• Security Holes: When security flaws exist in the operating system or
networking software, the virus will be able to defeat antivirus protection.
The antivirus software will be ineffective unless the user takes steps to keep
it updated.
• No customer care service: There will be no customer service provided
unless you pay for the premium version. If an issue arises, the only method
to solve it is to use forums and knowledge resources.
References
1.www.javatpoint.com/firewall
2.en.m.wikipedia.org/wiki/Firewall
_(computing)
3.www-geeksforgeeks-org.

Recommandé

edu03firewall,Antivirus software.pptx par
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
58 vues17 diapositives
mcq edu03 Anju 23.pdf par
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
47 vues5 diapositives
Firewall & packet filter new par
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
1K vues18 diapositives
Network security par
 Network security Network security
Network securityVikas Jagtap
1.5K vues122 diapositives
Firewall presentation par
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
1.1K vues24 diapositives
Firewall par
FirewallFirewall
FirewallApo
13.7K vues33 diapositives

Contenu connexe

Tendances

Firewall par
FirewallFirewall
Firewallthinkahead.net
794 vues22 diapositives
Network security and firewalls par
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
3.5K vues61 diapositives
Firewall presentation par
Firewall presentationFirewall presentation
Firewall presentationyogendrasinghchahar
12.9K vues49 diapositives
Introduction of firewall slides par
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
27.6K vues30 diapositives
Intoduction to Network Security NS1 par
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1koolkampus
1.5K vues14 diapositives
Firewall par
FirewallFirewall
FirewallMuhammad Sohaib Afzaal
4.5K vues21 diapositives

Tendances(20)

Network security and firewalls par Murali Mohan
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan3.5K vues
Introduction of firewall slides par rahul kundu
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu27.6K vues
Intoduction to Network Security NS1 par koolkampus
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
koolkampus1.5K vues
All about Firewalls ,IPS IDS and the era of UTM in a nutshell par Hishan Shouketh
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Hishan Shouketh1.7K vues
Firewall presentation par TayabaZahid
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid617 vues
Importance of Using Firewall for Threat Protection par HTS Hosting
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting24 vues
Network Security: Attacks, Tools and Techniques par waqasahmad1995
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
waqasahmad19952.8K vues
Firewall and its types and function par Nisarg Amin
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin22.7K vues
Network security - Defense in Depth par Dilum Bandara
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara5.8K vues
Firewalls and packet filters par MOHIT AGARWAL
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL2.7K vues

Similaire à Edu 03Anju 23 assignment.pdf

Firewall par
FirewallFirewall
Firewallsajeena81
225 vues21 diapositives
Security threats explained par
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
406 vues44 diapositives
Firewall par
FirewallFirewall
FirewallGarmian
108 vues8 diapositives
Enterprise firewalls feature and benefits par
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
1.9K vues14 diapositives
Firewall par
FirewallFirewall
FirewallNaga Dinesh
769 vues23 diapositives
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE par
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
33 vues25 diapositives

Similaire à Edu 03Anju 23 assignment.pdf(20)

Firewall par Garmian
FirewallFirewall
Firewall
Garmian108 vues
Enterprise firewalls feature and benefits par Anthony Daniel
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
Anthony Daniel1.9K vues
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE par SakshiSolapure1
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure133 vues
Firewall.pdf par ImXaib
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib19 vues
Network firewall function & benefits par Anthony Daniel
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
Anthony Daniel2.3K vues
Firewall presentation m. emin özgünsür par emin_oz
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz761 vues
What is fire wall and how it works par netsourceid
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it works
netsourceid167 vues
Security assignment (copy) par Amare Kassa
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa30 vues
Different Types Of Network Security Devices And Tools.docx par SameerShaik43
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
SameerShaik4315 vues
Welcome to International Journal of Engineering Research and Development (IJERD) par IJERD Editor
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor370 vues
Internet safety and you par Art Ocain
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain835 vues
Basic Home Computer Network And Computer Network Security... par Jennifer Letterman
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
Firewalls And Infrastructure Security par Brooke Curtis
Firewalls And Infrastructure SecurityFirewalls And Infrastructure Security
Firewalls And Infrastructure Security
Brooke Curtis4 vues

Dernier

BUSINESS ETHICS MODULE 1 UNIT I_A.pdf par
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfBUSINESS ETHICS MODULE 1 UNIT I_A.pdf
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfDr Vijay Vishwakarma
102 vues25 diapositives
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf par
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfSTRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfDr Vijay Vishwakarma
136 vues68 diapositives
12.5.23 Poverty and Precarity.pptx par
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptxmary850239
559 vues30 diapositives
OOPs - JAVA Quick Reference.pdf par
OOPs - JAVA Quick Reference.pdfOOPs - JAVA Quick Reference.pdf
OOPs - JAVA Quick Reference.pdfArthyR3
76 vues66 diapositives
Berry country.pdf par
Berry country.pdfBerry country.pdf
Berry country.pdfMariaKenney3
82 vues12 diapositives
MercerJesse3.0.pdf par
MercerJesse3.0.pdfMercerJesse3.0.pdf
MercerJesse3.0.pdfjessemercerail
183 vues6 diapositives

Dernier(20)

12.5.23 Poverty and Precarity.pptx par mary850239
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptx
mary850239559 vues
OOPs - JAVA Quick Reference.pdf par ArthyR3
OOPs - JAVA Quick Reference.pdfOOPs - JAVA Quick Reference.pdf
OOPs - JAVA Quick Reference.pdf
ArthyR376 vues
Presentation_NC_Future now 2006.pdf par Lora
Presentation_NC_Future now 2006.pdfPresentation_NC_Future now 2006.pdf
Presentation_NC_Future now 2006.pdf
Lora 38 vues
GSoC 2024 .pdf par ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz245 vues
Education of marginalized and socially disadvantages segments.pptx par GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati552 vues
11.30.23A Poverty and Inequality in America.pptx par mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239228 vues
Career Building in AI - Technologies, Trends and Opportunities par WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy51 vues
Guess Papers ADC 1, Karachi University par Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz109 vues
Peripheral artery diseases by Dr. Garvit.pptx par garvitnanecha
Peripheral artery diseases by Dr. Garvit.pptxPeripheral artery diseases by Dr. Garvit.pptx
Peripheral artery diseases by Dr. Garvit.pptx
garvitnanecha135 vues

Edu 03Anju 23 assignment.pdf

  • 2. PREVENTIVE MEASURES- FIREWALL,ANTIVIRUS SOFTWARE Firewall A firewall can be defined as a special type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a defined set of security rules. It acts as a barrier between internal private networks and external sources (such as the public Internet). The primary purpose of a firewall is to allow non-threatening traffic and prevent malicious or unwanted data traffic for protecting the computer from viruses and attacks. A firewall is a cybersecurity tool that filters network traffic and helps users block malicious software from accessing the Internet in infected computers. Firewall: Hardware or Software This is one of the most problematic questions whether a firewall is a hardware or software. As stated above, a firewall can be a network security device or a software program on a computer. This means that the firewall comes at both levels, i.e., hardware and software, though it's best to have both. Each format (a firewall implemented as hardware or software) has different functionality but the same purpose. A hardware firewall is a physical device that attaches between a computer network and a gateway. For example, a broadband router. On the other hand, a software firewall is a simple program installed on a computer that works through port numbers and other installed software. Apart from that, there are cloud-based firewalls. They are commonly referred to as FaaS(firewall as a service). A primary advantage of using cloud-based firewalls is that they can be managed centrally. Like hardware firewalls, cloud- based firewalls are best known for providing perimeter security.
  • 3. Why Firewall Firewalls are primarily used to prevent malware and network-based attacks. Additionally, they can help in blocking application-layer attacks. These firewalls act as a gatekeeper or a barrier. They monitor every attempt between our computer and another network. They do not allow data packets to be transferred through them unless the data is coming or going from a user-specified trusted source. Firewalls are designed in such a way that they can react quickly to detect and counter-attacks throughout the network. They can work with rules configured to protect the network and perform quick assessments to find any suspicious activity. In short, we can point to the firewall as a traffic controller. Some of the important risks of not having a firewall are: Open Access If a computer is running without a firewall, it is giving open access to other networks. This means that it is accepting every kind of connection that comes through someone. In this case, it is not possible to detect threats or attacks coming through our network. Without a firewall, we make our devices vulnerable to malicious users and other unwanted sources. Lost or Comprised Data Without a firewall, we are leaving our devices accessible to everyone. This means that anyone can access our device and have complete control over it, including the network. In this case, cybercriminals can easily delete our data or use our personal information for their benefit. Network Crashes In the absence of a firewall, anyone could access our network and shut it down. It may lead us to invest our valuable time and money to get our network working again. Therefore, it is essential to use firewalls and keep our network, computer, and data safe and secure from unwanted sources. Brief History of Firewall
  • 4. Firewalls have been the first and most reliable component of defense in network security for over 30 years. Firewalls first came into existence in the late 1980s. They were initially designed as packet filters. These packet filters were nothing but a setup of networks between computers. The primary function of these packet filtering firewalls was to check for packets or bytes transferred between different computers. Firewalls have become more advanced due to continuous development, although such packet filtering firewalls are still in use in legacy systems. As the technology emerged, Gil Shwed from Check Point Technologies introduced the first stateful inspection firewall in 1993. It was named as FireWall-1. Back in 2000, Netscreen came up with its purpose-built firewall 'Appliance'. It gained popularity and fast adoption within enterprises because of increased internet speed, less latency, and high throughput at a lower cost. The turn of the century saw a new approach to firewall implementation during the mid-2010. The 'Next-Generation Firewalls' were introduced by the Palo Alto Networks. These firewalls came up with a variety of built-in functions and capabilities, such as Hybrid Cloud Support, Network Threat Prevention, Application and Identity-Based Control, and Scalable Performance, etc. Firewalls are still getting new features as part of continuous development. They are considered the first line of defense when it comes to network security. Working A firewall system analyzes network traffic based on pre-defined rules. It then filters the traffic and prevents any such traffic coming from unreliable or suspicious sources. It only allows incoming traffic that is configured to accept. Typically, firewalls intercept network traffic at a computer's entry point, known as a port. Firewalls perform this task by allowing or blocking specific data packets (units of communication transferred over a digital network) based on pre-defined security rules. Incoming traffic is allowed only through trusted IP addresses, or sources. Functions of firewall • Network Threat Prevention • Application and Identity-Based Control
  • 5. • Hybrid Cloud Support • Scalable Performance • Network Traffic Management and Control • Access Validation • Record and Report on Events Types of Firewall • Proxy Firewall • Packet-filtering firewalls • Stateful Multi-layer Inspection (SMLI) Firewall • Unified threat management (UTM) firewall • Next-generation firewall (NGFW) • Network address translation (NAT) firewalls Limitations of Firewall • Firewalls cannot stop users from accessing malicious websites, making it vulnerable to internal threats or attacks. • Firewalls cannot protect against the transfer of virus-infected files or software. • Firewalls cannot prevent misuse of passwords. • Firewalls cannot protect if security rules are misconfigured. • Firewalls cannot protect against non-technical security risks, such as social engineering. • Firewalls cannot stop or prevent attackers with modems from dialing in to or out of the internal network. • Firewalls cannot secure the system which is already infected.
  • 6. Antivirus Antivirus software is a program(s) that is created to search, detect, prevent and remove software viruses from your system that can harm your system. Other harmful software such as worms, adware, and other threats can also be detected and removed via antivirus. This software is designed to be used as a proactive approach to cyber security, preventing threats from entering your computer and causing issues. Most antivirus software operates in the background once installed, providing real-time protection against virus attacks. While you may believe that your computer is safe as long as you don’t visit questionable websites, hackers have far more sophisticated methods of infecting your computer, which is why you need a powerful antivirus to stay to secure your data and system. The implications of a virus getting into your computer might be fatal. Viruses can cause a wide range of malicious behavior. They can crash your device, monitor your personal accounts, or spy on you through your webcam. So, always use antivirus software. How Antivirus Works: Antivirus software works by comparing your computer applications and files to a database of known malware kinds. Because hackers are continually creating and disseminating new viruses, it will also check systems for the presence of new or undiscovered malware threats. The antivirus checks files, programs, and applications going in and out of your computer to its database to identify matches. Similar and identical matches to the database are segregated, scanned, and eliminated. Most programs will employ three types of detection devices: • Specific detection, which looks for known parts or types of malware or patterns that are linked by a common codebase • Generic detection is a type of detection that looks for known parts or types of malware or patterns that are related to a common codebase. • Heuristic detection is a type of virus detection that looks for unknown infections by spotting suspicious file structures.
  • 7. Examples of Antivirus: The antivirus software is available in 2 types: (i) Free: Free anti-virus software provides basic virus protection (ii) Paid: commercial anti-virus software provides more extensive protection. The following are some commonly used antivirus software: 1. Bitdefender: Bitdefender Total Security is a comprehensive security suite that protects against viruses and dangerous malware of all varieties. This user-friendly antivirus software is compatible with all four major operating systems and smart homes, and it also includes a free VPN with a daily limit of 200MB, parental controls, camera protection, a password manager, etc. This security suite is reasonably priced and will protect up to five devices 24 hours a day, seven days a week. 2. AVAST: This is a free antivirus available. All you have to do to obtain top- notch protection on your computer, emails, downloads, and instant messages in the free version is register (for free) once a year. It includes a sophisticated heuristics engine that enables it to detect viruses. 3. Panda: It can detect viruses, trojans, spyware, adware, worms, and malware at the same level as other antiviruses do. It is different from others because using this software, when you scan your computer, it doesn’t consume any of your computer’s resources; instead, it runs in the cloud, allowing your machine to continue to function normally. Advantages of Antivirus: • Spam and advertisements are blocked: Viruses exploit pop-up advertising and spam websites as one of the most common ways to infect your computer and destroy your files. Antivirus acts against harmful virus- infected adverts and websites by denying them direct access to your computer network. • Virus protection and transmission prevention: It identifies any possible infection and then attempts to eliminate it. • Hackers and data thieves are thwarted: Antivirus do regular checks to see if there are any hackers or hacking-related apps on the network. As a result, antivirus offers complete security against hackers. • Protected against devices that can be detached: Antivirus scans all removable devices for potential viruses, ensuring that no viruses are transferred.
  • 8. • To improve security from web, restrict website access: Antivirus restricts your online access in order to prevent you from accessing unauthorized networks. This is done to ensure that you only visit websites that are safe and non-harmful to your computer. • Password Protection: Using antivirus, you should consider using a password manager for added security. Disadvantages of Antivirus: • Slows down system’s speed: When you use antivirus programs, you’re using a lot of resources like your RAM and hard drive. As a result, the computer’s overall speed may be significantly slowed. • Popping up of Advertisements: Apart from commercial antivirus applications, free antivirus must make money in some way. One approach to attaining these is through advertising. Many times these advertisements degrade the user experience by popping up every time. • Security Holes: When security flaws exist in the operating system or networking software, the virus will be able to defeat antivirus protection. The antivirus software will be ineffective unless the user takes steps to keep it updated. • No customer care service: There will be no customer service provided unless you pay for the premium version. If an issue arises, the only method to solve it is to use forums and knowledge resources. References 1.www.javatpoint.com/firewall 2.en.m.wikipedia.org/wiki/Firewall _(computing) 3.www-geeksforgeeks-org.