Assessment 2 Marvin
Assessment 2 Marvin
Assessment 2 Marvin
The firewall automatically blocks access to your computer from outside applications
and asks you what to do. Either click Allow Access, and follow the steps below, or
of the window
1. Click Advanced settings
2.
2. Select Specific local ports, type a port number (80), port numbers (80,81), or a
2. Select all of the profiles (Domain, Private, Public) only if you want the
requests from this port to allow access through the firewall no matter which
3. Click Next
1. Specify rule name
click Properties
Access control: Controls which systems can access the network and which
Data filtering and packet inspection: Scans data packets that enter and leave
the network in order to prevent malicious content from entering or leaving the
network.
external users.
security. It is the first line of defense for network security. It filters network packets
and stops malware from entering the user’s computer or network by blocking access
Characteristics of Firewall
1. Physical Barrier: A firewall does not allow any external traffic to enter a
system or a network without its allowance. A firewall creates a choke point for
all the external data trying to enter the system or network and hence can
4. Security Platform: It provides a platform from which any alert to the issue
related to security or fixing issues can be accessed. All the queries related to
security can be kept under check from one place in a system or network.
5. Access Handler: Determines which traffic needs to flow first according to
requirements which needs different structure and devices. All this can only be
doesn’t need to be secure. Some new threats can arise and if we have proper
paperwork of policies then the security system can be modified again and the
devices. All the information collected is combined to get the best results. Even
After retrieving and processing data, priority is set to people, devices, and
applications.
5. Identify Deployment Location: Every firewall has its strengths and to get the
most use out of it, we need to deploy each of them at the right place in a
Security policy is a very essential part of firewall design. Security policy is designed
according to the requirement of the company or client to know which kind of traffic is
Without it, there is an increase in risk as there will not be a proper implementation of
security solutions.
If the design of the solution is complex. then it will be difficult to implement it. If the
solution is easy. then it will be easier to implement it. A simple design is easier to
maintain. we can make upgrades in the simple design according to the new possible
threats leaving it with an efficient but more simple structure. The problem that
comes with complex designs is a configuration error that opens a path for external
attacks.
Every network security device has its purpose and its way of implementation. if we
use the wrong device for the wrong problem, the network becomes vulnerable. if the
outdated device is used for a designing firewall, it exposes the network to risk and is
almost useless. Firstly the designing part must be done then the product
requirements must be found out, if the product is already available then it is tried to
4. Layered Defense
security is broken, the network will be exposed to external attacks. Multilayer security
design can be set to deal with different levels of threat. It gives an edge to the
While giving a lot of attention to safeguarding the network or device from external
attacks. The security becomes weak in case of internal attacks and most of the
attacks are done internally as it is easy to access and designed weakly. Different
levels can be set in network security while designing internal security. Filtering can
be added to keep track of the traffic moving from lower-level security to higher level.
Advantages of Firewall:
system.
2. Stop unwanted visitors: A firewall does not allow a cracker to break into the
system through a network. A strong firewall detects the threat and then stops
the possible loophole that can be used to penetrate through security into the
system.
3. Safeguard the IP address: A network-based firewall like an internet
network or a system and keeps the IP address hidden so that it can not be
4. Prevents Email spamming: In this too many emails are sent to the same
address leading to the server crashing. A good firewall blocks the spammer
data flowing and later uses it for the wrong purpose. A firewall keeps track of
all the users accessing the system or network and if spyware is detected it
disables it.
Limitations:
1. Internal loose ends: A firewall can not be deployed everywhere when it comes
telephone lane that crosses paths with a data lane that carries the data
2. Infected Files: In the modern world, we come across various kinds of files
through emails or the internet. Most of the files are executable under the
according to the level of threat increases. The cost of devices used to build
the firewall increases. Even the maintenance cost of the firewall also
a network secure but they can make work less effective when it comes to a
require a permit from a person of higher authority making work slow. The
of a system. Using the RAM and consuming the power supply leaves very
less resources for the rest of the functions or programs. The performance of a
system can experience a drop. On the other hand hardware firewall does not
affect the performance of a system much, because its very less dependent on