340 likes | 415 Views
CTP 204 2006-2007 FALL Firewalls Filtering Properties Anti-virus Programs. WHAT IS A FIREWALL?. System or system group Traffic conroller. FIREWALLS PROPERTIES. Contol the traffic Let the traffic go Stop the traffic Block the packets Provide a first line of defense
E N D
CTP 2042006-2007 FALLFirewallsFiltering PropertiesAnti-virus Programs
WHAT IS A FIREWALL? • System or system group • Traffic conroller
FIREWALLS PROPERTIES • Contol the traffic • Let the traffic go • Stop the traffic • Block the packets • Provide a first line of defense • Make public network secure • Can not block viruses(disadvantage) • Block unauthorized access
How does a firewall work? • Create a guide table • Checks the packets PACKET(Source IP,Sink IP,Source Port,Sink Port) • Compare them with firewall rules • Delete or checks guide table
PERSONAL FIREWALLS Without a firewall: • Ftp(optional) • Http(optional) • Smtp • Pop3
PERSONAL SECURITY • Update the applications run on Internet (Outlook,Internet Explorer, ICQ,MSN…) • Usa a firewall and close unused ports (IPTABLES for Linux, NETFILTER for Windows) • Use a anti-virus program & always update • Disable Java, Java Script, ActiveX choice • Do not open the e-mails before searching for virus • Always take back-up of important files • Create a boot disc for hard-disc failure
FIREWALL TYPES Software based Hardware based
FILTERING PROPERTIES • Packet Filtering • Check only source IP&port, sink IP&port • Do not follow session • Stateful Inspection • Check the packet flow characteristic for each session • Complex from other filtering but secure • NAT(Network Address Translation) • Session level • Block the IP address of the computers • Show nat address & use only one IP • Proxy • Application level • Filter ftp,telnet applications • Filter certain commands of an application • Watch or block the local network users connection • High level security
NAT MECANISM • STEPS OF HOW DOES THE MECANISM WORKS • Take the packet from local network • Hold IP and port info of this packet • Make the source address self-address • Send packet to out world • Take the answer packet from out world • Check the tables and find the owner of the packet
COMPARING NAT & PROXY • Both hides IP addresses of the computers • Both can be used when IP address not enough • Both install session(Only Proxy interfere content) • Both slow down the network(CPU-RAM) • NAT easier to set up • Proxy require settings for each client (Internet Explorer,ICQ,MSN…) • Both are secure
FIREWALLS PERFORMANCE • Related with network performance • RAM and CPU should be higher when NAT & PROXY installed • Operation system should be harmony with firewall
INSTALLING FIREWALLS • CENTERAL building • MIXED building
CENTRAL Building • Advantages • Easy to config • Securer • Disadvantages • Effect all segments • Difficult to back up • Difficult to upgrade according to each user
MIXED Building • Advantages • Effect only one segment • Easy back-up • Used many different functions • Disadvantages • Expensive than central building • Can not generalize security politics
VLAN(VIRTUAL LAN) • Seperate each group • Makes the network securer • Supply more security with firewall
FIREWALL SETTINGS • Direct connection to firewall: • Enter the rules to command line(console) • If has web surface: • Enter the rules on web server • Installing the firewall setting console to another (secure)pc: • Enter the rules on that (secure)pc
WINDOWS FIREWALL Dangerous to open a new port for an unknown application
ANTI-VIRUS PROGRAMS COMMON PROPERTIES • Executable • Clonable • Hideable • Change a program codes • Change itself
VIRUS TYPES • File Virus • Command Runnable Virus • Boot Sector Virus • Script Virus • Macro • Worm • Trojan • Dailer
File Virus • Finishes with .com .bat .exe • Change file • Delete file
Command Runnable Virus • Roll the O\S files • Target command.com
Boot Sector Virus • Place to MBR(Master Boot Record) • Run before O\S
Script Virus • Roll from Internet Explorer,Outlook… • Active when a web site or e-mail opened
Macro • Use macro functions of MS-Office • Roll while opening
Worm • Roll using IP address & opened share files • Use RPC(Remote Procedure Call) of WINDOWS • Roll to sharing files • Copy it-self • Block the Internet traffic
Trojan • Take the passwords of victim PC • Spy virus • No damage
Dailer • Effect dial-up users • Disconnect the user from Internet • Mute the modem • Connect to an operator abroad • Make user pay too much money
ANTI-VIRUS PROGRAM PROPERTIES • Check existing folders • Clean\Quarantine contagious virus • Block the virus from CD,disc,internet
How does a anti-virus program work? • Create a database • Update the database • Take the control of the computer • Check all imports to pc
COMPARING ANTI-VIRUS PROGRAMS http://anti-virus-software-review.toptenreviews.com/?ttreng=1&ttrkey=anti-virus+programs