Free Essay

Compare and Contrast Three Forms of Malware

In:

Submitted By kidasi
Words 2385
Pages 10
Abstract
Three forms of malware that originally had legitimate applications, but have over time been developed as malicious software are taken into account: ActiveX control, Telnet, and NetBIOS. They are explained first, then the risks user can face if his computer is infected with that malware are given, and the countermeasures which should be taken in order to combat the malware. After that, the compare and contrast of the three forms of malware mentioned above is given. In the end, two recent forms of malware, Flame and FinFisher are explained.
ActiveX control
What is an ActiveX control?
ActiveX is a software component of Microsoft Windows. It is already installed in a computer with Internet Explorer. ActiveX controls are small programs, sometimes called add-ons that are used on the Internet. They can enhance browsing experience by allowing animation or they can help with tasks such as installing security updates at Microsoft Update. Some websites require installing ActiveX controls to see the site or perform certain tasks on it. When these websites are being visited, Internet Explorer asks to install the ActiveX control. The website that provides the ActiveX control should tell the visitor what the control is for. It should also provide relevant details on the web page before or after the warning. Internet Explorer blocks websites from using an ActiveX control if the website tries to use the ActiveX control in a way that might not be safe.
What are the risks?
ActiveX controls and web browser add-ons are small programs that are used extensively on the Internet. They can make browsing more enjoyable by providing toolbars, stock tickers, video, animated content, and more. These programs can malfunction, however, or give the unwanted content. In some cases, these programs can be used to collect information from a computer in ways the owner might not approve, possibly damage information on a computer, install software on a computer without the ownerfs consent, or allow someone else to control a computer remotely. Given these risks, ActiveX controls or add-ons should be installed only if the publisher and the website offering it are completely trusted. Here's a good rule to follow: If an ActiveX control is not essential to a computer activity, installing should be avoided.
The countermeasures
When an ActiveX control is chosen for installing, Internet Explorer displays a dialog box that identifies the publisher and asks the user if he wants to run the file. Donft run must be clicked if the website and publisher are not trusted. Only ActiveX controls that have been downloaded and installed by the user can be deleted. ActiveX controls that were preinstalled or add-ons of any kind cannot be deleted, but they can be disabled. To delete an ActiveX control that have been installed, the Manage add-ons tool in Internet Explorer must be used. If the add-on cannot be removed within Manage Add-ons, it can be uninstalled through Control Panel.
References:
1. http://windows.microsoft.com/en-US/Windows7/Why-does-Internet-Explorer-block-some-ActiveX-controls
2. http://www.microsoft.com/security/pc-security/activex.aspx
Telnet
What is telnet?
Telnet is an old computer protocol (set of programmatic rules). Telnet is famous for being the original Internet when the Net first launched in 1969. Telnet stands for 'telecommunications network', and was built to be form of remote control to manage mainframe computers from distant terminals. In those original days of large mainframe computers, telnet enabled research students and professors to 'log in' to the university mainframe from any terminal in the building. This remote login saved researchers hours of walking each semester. While telnet pales in comparison to modern networking technology, it was revolutionary in 1969, and telnet helped pave the way for the eventual World Wide Web in 1989. While telnet technology is very old, it is still in some use today by purists. Telnet has evolved into a new modern version of remote control called 'SSH', something that many modern network administrators use today to manage linux and unix computers from a distance. Telnet is a protocol that allows anyone to connect to remote computers (called hosts) over a TCP/IP network (such as the Internet). You use software called a telnet client on your computer to make a connection to a telnet server (i.e., the remote host). Once your telnet client establishes a connection to the remote host, your client becomes a virtual terminal, allowing you to communicate with the remote host from your computer. In most cases, you'll need to log into the remote host, which requires that you have an account on that system. Occasionally, you can log in as guest or public without having an account. Telnet clients are available for all major operating systems.
What are the risks? Telnet can be used to connect to virtually any machine that listens on ports. In other words, one can connect to any machine that has certain ports open. Once connected to a machine, one need to issue unix based commands to interact with the remote service. For example, a user don't need to login, check and send mails only through his email service provider's interface but this can be achieved using simple telnet commands. It is because of this reason that many hackers can send spoofed emails or access information such as which services are running on the remote machine. This is also called banner grabbing or daemon tracking. Black hat hackers can also use telnet to sniff network packets which might contain sensitive information such as usernames and passwords. This is achieved by using telnet and network utilities such as tcpdump and wireshark. On January 27, 2011 an article in the Internet shows that: \Hackers using Telnet to attack corporate servers; the 40-year-old remote access protocol is increasingly being used in attacks that came from mobile networks, according to Akamai. This report from Akamai Technologies shows that hackers appear to be increasingly using the Telnet remote access protocol to attack corporate servers over mobile networks.. (http://www.infoworld.com/d/security-central/hackers-using-telnet-attack-corporate-servers-619)
The countermeasures Telnet is a remote access tool used to log into remote servers, but it has been gradually replaced by SSH, also known as Secure Shell. Administrators are generally advised to disable Telnet if the protocol is not used to prevent attacks targeting it. Telnet is disabled by default on Windows7 for the simple reason that it is sometimes used as a callout mechanism by malware, and is generally not used by ordinary users, and thus a good candidate for disabling-by-default. Telnet client is not a security risk in-and-of-itself - although you can certainly turn it into one by sending usernames and passwords to servers which will transmit unencrypted over the network.
References:
1. http://kb.iu.edu/data/aayd.html
2. http://searchnetworking.techtarget.com/definition/Telnet
3. http://netforbeginners.about.com/od/t/f/what_is_telnet.htm
4. http://www.articleswave.com/tutorials/basic-telnet-tutorial.html
5. http://www.infoworld.com/d/security-central/hackers-using-telnet-attack-corporate-servers-619
NetBIOS
What is NetBIOS?
NetBIOS is a software protocol for providing computer communication services on local networks. Software applications on a NetBIOS network locate each other via their NetBIOS names. A NetBIOS name is up to 16 characters long and in Windows, separate from the computer name. Applications on other computers access NetBIOS names over UDP port 137. Two applications can communicate over a NetBIOS session when one (the client) sends a command to "Call" another (the server) over TCP port 139 on a remote computer. Both sides issue "Send" and "Receive" commands to deliver messages in both directions. The "Hang-Up" command terminates a NetBIOS session. NetBIOS can support connectionless communications via UDP datagrams on port 138. NetBIOS was developed in 1983 by Sytek as an API for software communication over IBM PC Network LAN technology. On PC-Network, as an API alone, NetBIOS relied on proprietary Sytek networking protocols for communication over the wire. Because PC
Network only supported up to 80 devices in its most accommodating mode (baseband), NetBIOS was itself designed with limited nodes in mind. NetBIOS provides three distinct services: - Name service for name registration and resolution. - Datagram distribution service for connectionless communication. - Session service for connection-oriented communication.
What are the risks? By default NetBIOS runs on port 139. It gives the various information about computers on a network, which includes computer name, username, domain, group, and many others. NBTSTAT is the command to manually interact with NetBIOS over TCP/IP. An intruder could use the output from an nbtstat command against a computer to begin gathering information about it. The next step for an intruder would be to try and list the open shares on the given computer, using the net view command. This information would give the intruder a list of shares which he would then use in conjunction with the Net Use command, a command used to enable a computer to map a share to its local drive.
The countermeasures
A null session occurs when one logs in to a system with no username or password. NetBIOS null sessions are a vulnerability found in the Common Internet File System. Once a hacker has made a NetBIOS connection using a null session to a system, they can easily get a full dump of all usernames, groups, shares, permissions, policies, services, and more using the Null user account. The NetBIOS null session uses specific port numbers on the target machine. Null sessions require access to TCP ports 135, 137,139, and/or 445. One of the countermeasures is to close these ports on the target system. This can be accomplished by disabling SMB (Server Message Block) services on individual hosts by unbinding the TCP/IP WINS client from the interface in the network connectionfs properties. For wireless networks, one of the countermeasures is to close the port 138. A security administrator can also edit the Registry directly to restrict the anonymous user from login. In addition, the Administrator account can be renamed to a nonobvious name (e.g., not admin or root), and set up a decoy Administrator account with no privileges.
References:
1. http://compnetworking.about.com/od/windowsnetworking/g/netbios.htm
2. http://searchnetworking.techtarget.com/definition/NetBIOS
3. http://en.wikipedia.org/wiki/Netbios
4. http://luizfirmino.blogspot.com/2011/07/understand-snmp-enumeration-and-its.html
Compare and contrast
Telnet and NetBIOS are both network related. Both of them are used for remote connection between computers. Telnet is a program that uses the telnet protocol over TCP/IP to talk to a telnet daemon to have a remote command line session, whereas NetBIOS is a lower level networking protocol. As for ActiveX control, it is a web-based component which enhances browsing experience, and is installed together with the Internet Explorer. NetBIOS is often used by Windows computers, and by Unix/Linux type computers running Samba. Its commands can often be used over the Internet. In many cases, however,
NetBIOS commands will be blocked by firewalls. Telnet and NetBIOS are DOS-based programs which means, that their commands can be run in DOS environment (cmd.exe). They are integrated with operating systems. As for ActiveX control, it is web-based component and is integrated with web browser Microsoft Internet Explorer.
Recent forms of malware
Flame (malware)
Flame is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system. The program is being used for targeted cyber espionage in Middle Eastern countries (Iran, Lebanon, Syria, Sudan, the Israeli Occupied Territories). Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National CERT (Computer Emergency Response Team), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. The last of these stated in its report that it "is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found." The malware, which is 20 megabytes when all of its modules are installed, contains multiple libraries, SQLite3 databases, various levels of encryption . some strong, some weak . and 20 plug-ins that can be swapped in and out to provide various functionality for the attackers. It even contains some code that is written in the LUA programming language . an uncommon choice for malware. Flame can spread to other systems over a local network (LAN) or via USB stick. It can record audio, screenshots, keyboard activity and network traffic. The program also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetooth-enabled devices. This data, along with locally stored documents, is sent on to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers. Analysis of Flame by the Kaspersky Lab indicates that itfs designed primarily to spy on the users of infected computers and steal data from them, including documents, recorded conversations and keystrokes. It also opens a backdoor to infected systems to allow the attackers to tweak the toolkit and add new functionality.
References:
1. http://en.wikipedia.org/wiki/Flame_%28malware%29
2. http://www.wired.com/threatlevel/2012/05/flame/
FinFisher (malware) FinFisher, also known as FinSpy, is surveillance software marketed by Gamma International, also known as the Gamma Group, a software firm based in the United Kingdom which markets the spyware through law enforcement channels. The malware is designed to spy on you via your phone. It can monitor your apps, emails, text messages, and voice calls. It can phone home to send data as well as get further instructions. It can track your location. Your phone can get infected if you are tricked into downloading the spyware, which can be disguised as something other than FinSpy. You donft even have to be using your browser: it can come via a text message that looks like itfs from your cellular provider, asking you to install an app or perform a system update.
References:
1.http://en.wikipedia.org/wiki/FinFisher
2. http://thenextweb.com/mobile/2012/08/29/finfisher-malware-goes-mobile-infects-android-iphone-blackberry/

Similar Documents

Free Essay

Cyberspace

...Lab Assignment: Password Cracking Using Cain and Abel Introduction The objective of this lab assignment is to introduce you to various techniques used in password cracking. You will experience how it is done first hand by using a software application called “Cain and Abel.” Background Information 1. About “Cain and Abel” Cain and Abel is a powerful tool for system administrators, network administrators, and security professionals. Its web site states that it is password recovery tool for Microsoft Operating Systems. In order to release the full functionality of the Cain and Abel package, “Win Pcap” must be installed in order to provide network packet captures. Through this, Cain and Abel has the ability to crack encrypted passwords using Brute Force, Dictionary, or Cryptanalysis (via “rainbow tables”). The sniffer (captures and analyzes network traffic) in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms, including Kerberos. In addition to this, Cain and Abel can used to recover wireless passwords, uncover cached passwords, and analyze routing protocols. 2. Algorithms There are two authentication protocols used to store passwords depending on which version of Windows is being run. The two are LM and NTLM. * LM The LM, sometimes referred to as LanMan or the LAN Manager hash, is the primary authentication protocol that Microsoft employed...

Words: 1655 - Pages: 7

Premium Essay

Week 1 Discussion 1

...Networking Security Fundamentals Week 1 Question 1 "Providing Security Over Data" Please respond to the following: The CIA Triad offers three security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the means in which each of the three tenets are addressed to mitigate risk and enhance security in your chosen environment. In my workplace, all three security tenets are strongly enforced. Our information systems are available 99.9% of the time. We have specialists on call to support all facets of the organization, so even an unplanned outage can be mitigated by flipping to a mirror, then correcting the issue in the production environment. The integrity of the information is protected by the user account controls implemented by the data administrators, who create views and profiles for each user. Additionally, network admins restrict access to the data servers themselves. The confidentiality is also protected by the user account controls. With these in place, only authorized users are able to access or modify data. The use of mobile devices to create or access data has gained worldwide appeal and has obtained critical mass. From the e-Activity, summarize the attack and describe how you would mitigate the threat.  Mobile devices are now more alluring to attackers due to the concentration of users on a small base of operating systems. For example, prior to the launch of smart...

Words: 1411 - Pages: 6

Premium Essay

Business Law

...duty of ensuring that businesses are following federal law and regulations. According to Merrill Lynch, there vision is to be the preeminent financial management and advisor company in the world with a drive that’s rooted in intelligence, principles and optimism. Although, Merrill Lynch claimed to strive to be the best at financial management, according to the Securities and Exchange Commission “they failed to inform investors that hedge fund firm Magnetar Capital Limited Liability Corporation had a third-party role and exercised significant influence over the selection of collateral for the collateralized debt obligations” (2013). This discuss will first look into the validity of contract and the duty of banks. Next, it will compare and contrast intentional and negligent Torts and how they interfere with contractual relationships. Lastly, it will look at the effects that mobile banking has on online transactions. A contract is defined as a legally enforceable promise or set of promises (Bagley, 2012). Contract contains two or...

Words: 1357 - Pages: 6

Premium Essay

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...

Words: 25389 - Pages: 102

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Free Essay

E-Security Review

...E-SECURITY REVIEW 2008 Submission from Microsoft Australia Introduction Microsoft Australia welcomes the opportunity to participate through this Submission in the Whole-of Government Review of E-Security. A periodic review of the E-Security framework, in light of the quickly evolving threat landscape, is both timely and appropriate. Over the last thirty years there have been dramatic advances in information technology - the development of the microprocessor, the rise of the personal computer, the emergence of the Internet - which have revolutionised the way information is created, stored, shared, and used. Today, powerful, affordable and diverse devices, together with expanding broadband networks, create a powerful opportunity for connectivity for individuals and communities. Over the past two decades, rapid advances in software, IT services, and communications have enabled many traditionally separate and disparate infrastructures and business operations to become more connected. Through this connectivity virtually every aspect of society has experienced a transformation. Businesses and governments have been able to manage and streamline their operations. Individuals have been offered ready access to multiple sources of information thereby expanding knowledge and choice. Across every field of endeavour – commercial, social, scientific and philanthropic – the power of information has been increased and the transaction costs of engagement have been lowered. Our broad reliance...

Words: 13936 - Pages: 56

Premium Essay

Stats

...years. There has always been an almost surprising stability to answers about tools and methodology in this survey and this year is not an exception. What is different, broadly speaking, is that there is considerably more context within which these results may be interpreted. There are a number of very good reports of various kinds now available on the Web. All of them that we’re aware of, with the exception of this one, are either provided by vendors or are offered by analyst firms. That’s not to say that there’s anything wrong with these sources. A tremendous amount of useful information is offered in these various reports. But independent research seems fundamental and we believe the survey provides this. Beginning last year, there were three important changes to this survey. The first was that a “Comprehensive” edition was offered, one of its key objectives being to attempt to take other report findings into account so that a proper context could be achieved. Additionally, the survey questionnaire added questions that attempted to determine not only what security technologies respondents used, but additionally how satisfied they are with those technologies. This year, we continue both with a more comprehensive report document but also with the questions regarding satisfaction with results....

Words: 16095 - Pages: 65

Free Essay

Software

...candidates to know that whilst on occasion questions may look similar to those in past papers, the context and approach is often significantly different, which means that previous answers cannot simply be restated; thus it is not appropriate to memorise and re-state past paper answers. Additionally, the answer pointers provided here give guidance and are only a guideline and should not be merely quoted by candidates, but applied to the topic of the question.” A1 a) i) Explain the role and structure of a DTD in relation to an xml document. ii) Explain the role and structure of an XML schema in relation to an xml document. iii) Explain how an xml document would call:  an internal DTD  an external DTD and;  an XML schema. b) i) Compare and contrast the workings of a DTD and an xml schema. You should state the benefits of using each. [3 marks] ii) Generate an appropriate sample XML document based on the xml schema in figure 1.1 [2 marks] [2 marks] [3 marks] [2 marks]...

Words: 3199 - Pages: 13

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Premium Essay

Computer Memory

...Computer Memory 1.Introduction: Just like humans, computers rely a lot on memory. They need to process and store data, just like we do. However, computers store data in digital format, which means the information can always be called up exactly the way it was stored. computer memory - an electronic memory device; "a memory and the CPU form the central part of a computer to which peripherals are attached" 1.1History of memory: In the early 1940s, memory technology mostly permitted a capacity of a few bytes. The first electronic programmable digital computer, the ENIAC, using thousands of octal-base radio vacuum tubes, could perform simple calculations involving 20 numbers of ten decimal digits which were held in the vacuum tube accumulators. The next significant advance in computer memory came with acoustic delay line memory, developed by J. Presper Eckert in the early 1940s. Through the construction of a glass tube filled with mercury and plugged at each end with a quartz crystal, delay lines could store bits of information within the quartz and transfer it through sound waves propagating through mercury. Delay line memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient. Two alternatives to the delay line, the Williams tube and Selectron tube, originated in 1946, both using electron beams in glass tubes as means of storage. Using cathode ray tubes, Fred Williams would invent the Williams tube, which would be the first random...

Words: 3247 - Pages: 13

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Premium Essay

Whay Both Parents Should Take Equal Resoponsibillty of There Children

...Student Workbook  ICAICT101A Operate a personal computer 1st Edition 2011 Part of a suite of support materials for the ICA11 Information and Communications Technology Training Package v1. Acknowledgement These materials were developed by Innovation and Business Skills Australia in association with the Commonwealth Government through the Department of Education, Employment and Workplace Relations (DEEWR), and the South Australian Department for further Education, Employment, Science and Technology. Copyright Statement © 2011 Commonwealth of Australia The views expressed in the copyright work do not necessarily represent the views of the Commonwealth of Australia. This work is copyright and licensed under the AEShareNet Share and Return Licence (AEShareNet–S Licence). The onus rests with you to ensure compliance with the AEShareNet-S Licence and the following is merely a summary of the scope of the Licence. When you obtain a copy of material that bears the AEShareNet-S Licence mark by legitimate means you obtain an automatic licence to use, copy, adapt and/or redistribute this work. If you develop enhancements of the material, you agree that copyright in any enhancements vest automatically in the original copyright owner. Conditions for the Licence can be found at . Queries regarding the standard AEShareNet-S Licence conditions should be directed to the AEShareNet website at . In addition to the standard AEShareNet-S Licence conditions, the following special conditions...

Words: 16837 - Pages: 68

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Network Security

...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you complete...

Words: 15367 - Pages: 62

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62