Osy Ganesh
Osy Ganesh
Osy Ganesh
Project Guide
Prof: P. V. Dhurve
1
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION (MSBTE), MUMBAI
2024-2025
A
Project Report
On
[INTERNET SECURITY AND FIREWALL]
2
Brahma Valley College of Technical Education,
Anjaneri, Nashik
CERTIFICATE
This is to certify that
Prof. P. V. Dhurve
Guide External
3
Brahma Valley College of Technical Education,
Anjaneri, Nashik
CERTIFICATE
Prof. P. V. Dhurve
Guide External
4
ACKNOWLEDGEMENT
We would like to deeply thank the various people who, during the several months which this
endeavour lasted, provided us with useful and helpful assistance. Without care and
consideration, this seminar would likely not have matured.
First, we would like to thank our project guide Head of Dept. Prof. M. M. Kulkarni Sir for
his guidance and interest. Her guidance reflects expertise we certainly do not master ourselves.
I also thank him for his patience throughout, in cross-reviewing which constitutes a rather
difficult balancing act.
Second, we would like to thank to subject teacher Prof. P. V. Dhurve all the Staff Members
of Computer Department for providing us their admirable feedback and insights whenever I
discussed my project with them. I also extend my thanks to our lab assistants who guided us in
implementation of our seminar.
I would like to extend my special thanks to our Principal, Prof. V. P. Nikhade for his
encouragement and words of wisdom.
Finally, I express my deepest gratitude to my family and friends who encouraged me since the
beginning and provided me with their insightful reviews to help me make my Project
successful.
5
INDEX
Page
Sr.no Topic
No.
1 ABSTRACT 1
2 INTRODUCTION TO PROJECT 2
3 RATIONALE 3
4 LITERATURE REVIEW 4
5 MICRO-PROJECT OUTCOMES 5
5 COURSE OUTCOMES 6
7 OUTPUTS OF MICRO-PROJECTS 10
8 SKILL DEVELOPED 11
6
ABSTRACT:
In an increasingly interconnected digital world, the importance of robust internet
security and firewalls cannot be overstated. This paper explores the critical role of internet
security in protecting sensitive information and maintaining the integrity of network systems.
Firewalls serve as the first line of defense against cyber threats, providing a barrier that
monitors and controls incoming and outgoing network traffic. By implementing various
security protocols, organizations can safeguard against malware, data breaches, and
unauthorized access, ensuring the confidentiality of user data.
Furthermore, the paper discusses the necessity of compliance with industry regulations,
the ability to manage and monitor network traffic effectively, and the enhancement of user trust
through strong security measures. With the rise of remote work and the evolving landscape of
cyber threats, firewalls are essential not only for protecting organizational assets but also for
facilitating secure access to resources from diverse locations. Ultimately, this exploration
underscores the need for a comprehensive approach to internet security, combining technology,
policy, and user awareness to create a resilient defense against the myriad challenges posed by
today’s cyber environment.
1
INTRODUCTION TO PROJECT:
In today’s digital era, the reliance on internet-based services has grown exponentially,
leading to increased vulnerabilities and potential threats to sensitive data. As organizations and
individuals engage more extensively online, the necessity for robust internet security measures
becomes paramount. This project aims to explore the significance of internet security and
firewalls as essential components of a comprehensive cybersecurity strategy.
With the proliferation of cyber threats—ranging from malware and phishing attacks to
sophisticated intrusions—protecting networked systems has become a critical priority.
Firewalls serve as the first line of defense, regulating traffic based on predetermined security
rules, thus preventing unauthorized access and potential attacks. The implementation of
effective firewalls, alongside other security measures, helps safeguard confidential information
and maintain the integrity of network communications.
The outcomes of this project will offer valuable insights into the best practices for
implementing internet security measures and firewalls, ultimately contributing to enhanced
protection against cyber threats. By understanding the interplay between firewalls and overall
security strategies, organizations can better prepare to defend against evolving cyber risks,
ensuring the safety of their digital assets and the trust of their users.
2
Literature Review
3
RATIONALE:
1. Protection Against Cyber Threats
1. Malware Defense: Firewalls help protect against malware, viruses, and ransomware
attacks by monitoring and controlling incoming and outgoing traffic.
2. Intrusion Prevention: They act as a barrier that prevents unauthorized access to
networks and systems, reducing the risk of data breaches.
1. Secure Data Transmission: Internet security protocols (like SSL/TLS) ensure that
data transmitted over the internet is encrypted and secure from interception.
2. Confidentiality of Sensitive Information: Firewalls help safeguard personal and
financial information from unauthorized access, ensuring user privacy.
3. Regulatory Compliance
1. Internal Security: Firewalls can also help monitor internal network traffic, providing
a layer of protection against insider threats, such as employees misusing access to
sensitive information.
1. Traffic Management: By controlling and managing network traffic, firewalls can help
reduce congestion and improve overall system performance.
4
MICRO-PROJECT OUTCOMES:
1. Understanding Key Concepts
1. Basic Terminology: Students will become familiar with key terms such as firewalls,
VPNs, intrusion detection systems, and encryption.
2. Security Models: Learn about different security models, including CIA
(Confidentiality, Integrity, Availability) and defense in depth.
2. Practical Application
3. Threat Analysis
4. Policy Development
1. Security Policies: Create a basic Internet security policy for a small organization,
covering acceptable use, password management, and incident response.
2. User Training Materials: Develop training materials to educate users on safe
internet practices and the importance of firewalls.
1. Ethical Considerations: Discuss the ethical implications of security practices and the
importance of responsible usage.
5
COURSE OUTCOMES (CO):
1. Knowledge of Security Principles
2. Firewall Technologies
3. Configuration Skills
Configure and implement firewall settings using both hardware and software
solutions to protect network infrastructure.
5. Risk Assessment
6. Incident Response
7. Policy Development
Create and evaluate internet security policies and best practices for organizations,
focusing on user awareness and compliance.
Examine the ethical and legal aspects of internet security, including data privacy laws
and ethical hacking principles.
6
ACTUAL PROCEDURE FOLLOWED:
1. Internet Security
Internet security is a branch of computer security specifically related to not only
Internet, often involving browser security and the World Wide
Web, but also network security as it applies to other applications or operating systems as a
whole. Its objective is to establish rules and measures to use against attacks over the Internet.[1]
The Internet represents an insecure channel for exchanging information, which leads to a high
risk of intrusion or fraud, such as phishing, online viruses, Trojans, worms and more.
a) Malicious software
An internet user can be tricked or forced into downloading software that is of malicious
intent onto a computer. Such software comes in many forms, such as viruses, Trojan horses,
spyware, and worms.
b) Denial-of-service attacks
A denial-of-service attack (Do’s attack) or distributed denial-of service attack (Didoes
attack) is an attempt to make a computer resource unavailable to its intended users. Another
way of understanding Dados is seeing it as attacks in cloud computing environment that are
growing due to the essential characteristics of cloud computing.[4] Although the means to carry
out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted
efforts to prevent an Internet site or service from functioning efficiently or at all, temporarily
or indefinitely.
c) Network layer security
TCP/IP protocols may be secured with cryptographic methods and security protocols.
These protocols include Secure Sockets Layer (SSL), succeeded by Transport Layer Security
(TLS) for web traffic, Pretty Good Privacy (PGP) for email, and IPsec for the network layer
security.
d) Internet Protocol Security (IPsec)
IPsec is designed to protect TCP/IP communication in a secure manner. It is a set of
security extensions developed by the Internet Task Force (IETF). It provides security and
authentication at the IP layer by transforming data using encryption. Two main types of
transformation that form the basis of IPsec: the Authentication Header (AH) and ESP. These
two protocols provide data integrity, data origin authentication, and interplay service. These
protocols can be used alone or in combination to provide the desired set of security services
for the Internet Protocol (IP) layer.
7
2. Firewall
a) The first among the components is the “Internet Access Security Policy” of an
organization. This means that when the organization is connecting to the internet what was the
expected level of security at high level. Without depending on the equipment that are used the
security policy must have a life time because it is not based on the techniques and the
technology that is implemented (Government of the Hong Kong, 2009). According to this
statement, an instance for this type of security policy is a corporate network of an organization
is not accessed by the external users that means they are not permitted use that network if not
they have unauthorized authentication. If an organization require transferring its corporate
information through the internet and if that information is not available in the public domain
then the information is transferred in a confidential approach. And all the other external
services will be banned and only the corporate users are permitted to send e-mails across the
internet.
b) The other component in making the firewalls is mapping of the security policy on the
procedures and technical designs, these procedures and technical designs on which the security
policy is mapped must be followed and implemented while connecting to the internet. During
this process the configuration of the system will be changed and the information will be added
as a fresh technology and so on. The usage of one-time passwords can be taken as example for
the technical design considering the authentication of an organizational network. Generally the
technical designs depends on one security policy among the two polices. The two policies are
allowing any service except it is denied expressly or deny any service except it is permitted
expressly. The second one is the most secure among the two security policies.
c) The third one is firewall system which is a combination of both software and hardware
that means the both the software and hardware components can make the firewall. Generally a
firewall system is made up of an “IP packet filtering router” and a host computer sometimes it
is also called as application gateway or a bastion host which will run authentication software
and application filtering.
All the above components are very important and necessary for making a firewall. A firewall
is said to be not configured properly if there is no Internet access security policy. There is no
value for the policy if that is not configured properly and also if is not enforced with worthy
procedures.
8
3. FIREWALLS TYPES
a) Packet filter
The first reported type of network firewall is called a packet filter, which inspect
packets transferred between computers. The firewall maintains an access control list which
dictates what packets will be looked at and what action should be applied, if any, with the
default action set to silent discard. Three basic actions regarding the packet consist of a silent
discard, discard with Internet Control Message Protocol or TCP reset response to the sender,
and forward to the next hop. Packets may be filtered by source and destination IP addresses,
protocol, source and destination ports. The bulk of Internet communication in 20th and early
21st century used either Transmission Control Protocol (TCP) or User Datagram Protocol
(UDP) in conjunction with well-known ports, enabling firewalls of that era to distinguish
between specific types of traffic such as web browsing, remote printing, email transmission,
file transfer.
The first paper published on firewall technology was in 1987 when engineers from
Digital Equipment Corporation (DEC) developed filter systems known as packet filter
firewalls. At AT&T Bell Labs, Bill Cheswick and Steve Beloved continued their research in
packet filtering and developed a working model for their own company based on their original
first-generation architecture.
b) Connection tracking
From 1989–1990, three colleagues from AT&T Bell Laboratories, Dave Presotto,
Jamadar Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling
them circuit-level gateways.
Second-generation firewalls perform the work of their first generation predecessors but
also maintain knowledge of specific conversations between endpoints by remembering which
port number the two IP addresses are using at layer 4 (transport layer) of the OSI model for
their conversation, allowing examination of the overall exchange between the node]s.
9
OUTPUTS OF MICRO-PROJECTS:
10
SKILL DEVELOPED:
1. Technical Proficiency
2. Analytical Skills
3. Problem-Solving Skills
a) Incident Response: Skills to develop and execute effective incident response plans
in the event of a security breach.
b) Vulnerability Mitigation: Ability to design solutions to mitigate identified security
risks.
4. Research Skills
a) Emerging Threats: Ability to research and stay updated on current trends and
emerging threats in cybersecurity.
5. Policy Development
6. Communication Skills
a) Reporting: Ability to create clear and concise reports on security assessments and
findings.
b) Presentations: Skills to effectively present security concepts and findings to both
technical and non-technical audiences.
11
CONCLUSION / FUTURE SCOPE:
The course on Internet Security and Firewalls equips participants with essential knowledge and
skills to navigate the complex landscape of cybersecurity. As threats to digital assets continue
to evolve, understanding how to protect networks through effective firewall management and
security practices becomes increasingly critical. This course not only covers foundational
concepts but also emphasizes practical applications, enabling students to implement security
measures effectively in real-world scenarios.
3. Cloud Security
With the increasing shift to cloud computing, expertise in cloud security practices and tools
will become essential. Understanding how to secure cloud environments and data will be a
key area of focus.
4. IoT Security
As the Internet of Things (IoT) continues to expand, addressing the unique security
challenges associated with connected devices will be crucial. This includes understanding
how to secure networks that incorporate IoT devices.
12