What is a Firewall?
The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network.
The primary goal of a firewall is to implement a desired security policy; controlling access in both directions through the firewall, and to protect the firewall itself from compromise. It wards off intrusion attempts, Trojans and other malicious attacks.
Personal Firewalls:
They are meant for the home user in a networked environment. They aim to block simple attacks, unlike the enterprise level firewalls that the corporate world uses at the server or router end. There are many ways to implement a firewall, each with specific advantages and disadvantages.
Are they really needed?
Nowadays organizations and professionals use Internet technology to establish their online presence and showcase their products and services globally. Their endeavor is to leverage digital technology to make their business work for them.
All the organizations and professionals are shifting from Dialup to broadband and getting a fixed IP. It has led to an increase in security attacks, bugs in everyday working. This does not mean that Dialup being anonymous dynamic link or the firewall of the ISP network make you pretty safe.
Now if your machine was under attack, you must have wondered what went wrong making your system crash suddenly. So I would rather like to say, it's not necessary for anyone to actually know about you or your IP address to gain access to your system.
If you system is infected or prone to intrusions, then beyond the anonymity of your Dialup connection or a dynamic IP, your system can be hacked.
Types of Attacks
Intrusion:
There are many ways to gain unauthorized access to a system. Operating system vulnerabilities, cracked or guessed passwords are some of the more common. Once access is attained, the intruder can send email, tamper with data, or use the system privileges to attack another system.
Information Theft and Tampering:
Data theft and tampering do not always require that the system be compromised. There have been many bugs with FTP servers that allow attackers to download password files or upload Trojan horses.
Service Attacks:
Any attack that keeps the intended user from being able to use the services provided by their servers is considered a denial of service attack. There are many types of denial of service attacks, and unfortunately are very difficult to defend against. "Mail bombs" are one example in which an attacker repeatedly sends large mail files in the attempt at filling the server's disk filesystem thus preventing legitimate mail from being received.
Types of Attackers
Joyrider:
Not all attacks on computer systems are malicious. Joyriders are just looking for fun. Your system may be broken into just because it was easy, or to use the machine as a platform to attack others. It may be difficult to detect intrusion on a system that is used for this purpose. If the log files are modified, and if everything appears to be working, you may never know.
Vandals:
A vandal is malicious. They break in to delete files or crash computer systems either because they don't like you, or because they enjoy destroying things. If a vandal breaks into your computer, you will know about it right away. Vandals may also steal secrets and target your privacy.
"In an incident a Trojan was being used to operate the web cam. All the activities being done in the house were being telecasted on the websites."
Spies:
Spies are out to get secret information. It may be difficult to detect break-ins by spies since they will probably leave no trace if they get what they are looking for.
A personal firewall, therefore, is one of the methods you can use to deny such intrusions.
How Firewalls work?
Firewalls basically work as a filter between your application and network connection. They act as gatekeepers and as per your settings, show a port as open or closed for communication. You can grant rights for different applications to gain access to the internet and also in a reverse manner by blocking outside applications trying to use ports and protocols and preventing attacks. Hence you can block ports that you don't use or even block common ports used by Trojans.
Using Firewalls you can also block protocols, so restricting access to NetBIOS will prevent computers on the network from accessing your data. Firewalls often use a combination of ports, protocols, and application level security to give you the desired security.
Firewalls are configured to discard packets with particular attributes such as:
Choosing a firewall:
Choose the firewalls which have the ability to ward of all intrusion attempts, control applications that can access the internet, preventing the malicious scripts or controls from stealing information or uploading files and prevent Trojans and other backdoor agents from running as servers.
The purpose of having a firewall cannot be diminished in order to gain speed. However, secure, high-performance firewalls are required to remove the bottleneck when using high speed Internet connections. The World-Wide-Web makes possible the generation of enormous amounts of traffic at the click of a mouse.
Some of the good firewall performers available in the market are below:
Most of these firewalls are free for personal use or offer a free trial period. All the personal firewalls available can't ensure 100% security for your machine. Regular maintenance of the machine is needed for ensuring safety.
Some of the tasks advised for maintaining system not prone to intrusions:
About The Author
Pawan Bangar,
Technical Director,
Birbals,India
ebirbals@gmail.com
The words Corporate Security may conjure up images of a... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
A little bit of time invested into learning about internet... Read More
At this point, if you've got the whole "turning the... Read More
Before you enter your name, address or any other data... Read More
There has not been a time in the history of... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Microsoft routinely releases new security updates, many of which are... Read More
You can detect spyware online using free spyware cleaners and... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Security leaks can be a big problem for any site... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Spyware is the most troublesome software to appear on the... Read More
These six ways to prevent identity theft offer you valuable... Read More
The average computer is packed with hidden software that can... Read More
Huge number of spyware software applications are available in the... Read More
Be careful of sites that promise to send you "instant... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
First of all we need to get some terms stated.... Read More
A couple of days ago, I was searching for a... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
The money being spent online is steadily growing. With billions... Read More
My first experience with a spyware BHO based infection was... Read More
You are at your computer, checking out software on EBay.... Read More
Over the past few years as the internet has become... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Did you know...? 1 in 5 children who use computer... Read More
This is the second in a series of articles highlighting... Read More
While clicking from site to site on the internet you... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Do you sometimes notice your computer running slower. Is your... Read More
It's late. You've been scouring the web for that perfect... Read More
Is your data secure? Think again. Securing data is unlike... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Whether we like it or not, we are all living... Read More
So called phishers try to catch the information about the... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
A friend called me one day and asked if I... Read More
Have you ever bought a product or service from the... Read More
When we think of adware, what comes to mind are... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
This is the second in a series of articles highlighting... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
P C. owners are constantly at risk from attacks by... Read More
Watching how the traditional media covers the latest virus or... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Every now and then you can read about a new... Read More
Viruses are, however, not the only malicious software programs out... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
There are several basic concepts to keep in mind when... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
When the Internet first came about, it was realized it... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Phishing is the act of some individual sending an email... Read More
It has been said that with the wealth of information,... Read More
Internet Security |