What is a Firewall? Name configurations of Firewall and describe any one of them.

A firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter, forming a single choke point where security and audit can be imposed. A firewall:

  1. defines a single choke point that keeps unauthorized users out of the protected network, prohibits potentially vulnerable services from entering or leaving the network, and provides protection from various kinds of IP spoofing and routing attacks.

2. provides a location for monitoring security-related events

3. is a convenient platform for several Internet functions that are not security related, such as NAT and Internet usage audits or logs

4. A firewall can serve as the platform for IPSec to implement virtual private networks.

The firewall itself must be immune to penetration, since it will be a target of attack.

 

1.“screened host firewall, single-homed bastion configuration”

2. “screened host firewall, dual-homed bastion configuration”

which physically separates the external and internal networks, ensuring two systems must be compromised to breach security. The advantages of dual layers of security are also present here. Again, an information server or other hosts can be allowed direct communication with the router if this is in accord with the security policy, but are now separated from the internal network.

3. “screened subnet firewall configuration”

11) What is Malicious Software? Describe Worms and their phases.

A worm is a program that can replicate itself and send copies from computer to computer across network connections. Upon arrival, the worm may be activated to replicate and propagate again, and usually to also perform some unwanted function. A worm actively seeks out more machines to infect and each machine that is infected serves as an automated launching pad for attacks on other machines. To replicate itself, a network worm uses some sort of network vehicle such as email, remote execution, or remote login. Once active within a system, a network worm can behave as a computer virus or bacteria, or it could implant Trojan horse programs or perform any number of disruptive or destructive actions.

Ø worm phases like those of viruses:

l dormant

l propagation

search for other systems to infect

establish connection to target remote system

replicate self onto remote system

l triggering

l execution