FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
Free Software Alternatives: Avast! Anti-virus
Lesson 19: Configuring Windows Firewall
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
1 Computer Security: Protect your PC and Protect Yourself.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
Bag – O – Bytes Brought to you by The FPB Help Desk X6322 VPN and Case Software Center Sept 8 th, 2004.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Cyber Patriot Training
© 2009 FP Mailing Solutions. All rights reserved. Customer Service Training Basic Computer Training.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
By For: EDT Networking & Trouble Shooting Jim ChiavacciSpring 2004.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
Downloading and Installing Autodesk Revit 2016
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Because you need to protect your computers!!! By: Ashley Hubbard.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Lesson 11: Configuring and Maintaining Network Security
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
NetTech Solutions Protecting the Computer Lesson 10.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Latest Issues Related To The AVG Antivirus 2017
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Unit 4 IT Security.
Malware aka- malicious software By: Ken Fogel
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
Software basics on the Internet
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
How to Fix Norton Antivirus Sonar Protection Error.
Risk of the Internet At Home
Internet Safety for Everyone
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Information Security Session October 24, 2005
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Internet Safety for Everyone
Presentation transcript:

FIREWALL

The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw M.2/5 No.30

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls will prevent unauthorized Internet users from accessing private networks connected to the Internet By Kalint Muangsornkeaw M.2/5 No.30

Please make sure that you only install one firewall, otherwise you will cause severe system instability and may have to reinstall your operating system. 1.Please go to Zone Alarm's site and download Zone Alarm Free Edition. 2.Save the file to your desktop. 3.Doubleclick on the zaSetup_en.exe file that you just saved. 4.After you double click the file, it will ask which version of Microsoft Windows you are using. 5.Select your window version then click next for download to your computer. 6.After Zone Alarm downloads, click the Next button for installation. 7.On the next screen, enter a valid address so you can register and download future Zone Alarm updates and then click Next. HOW TO INSTALL FIREWALL 8.Put a checkmark next to the "I accept the terms of the preceding License Agreement" and click Install.

10.Zone Alarm will scan your computer so it can auto-configure the necessary configuration. 11.ZoneAlarm is now installed on your computer and then restart your computer 12.When your computer restarted, Getting Started window will show up, please watch the video until finish. 13.ZoneAlarm is now configured for your computer. BY PANAPHON SANGOBSAKUN NO.20 M.2/5 9.Then it will asks if you want to start Zone Alarm now, click the Yes button.

Advantages of firewall: Concentration of security, all modified software and logging is located on the firewall system as opposed to being distributed on many hosts; Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation

Disadvantage 1. The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc. However, these disadvantages are not unique to firewalls; network access could be restricted at the host level as well, depending on a site's security policy. 2. A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet. This weakness can be countered, however, with the argument that lapses and weaknesse in security are more likely to be found as the number of systems in a subnet increase, thereby multiplying the ways in which subnets can be exploited.

1.Go to start 2.Go to setting 3.Open control panel 4.Open security center 5.Open window fire wall 6.Turn it on 7.You can turn off the fire wall temporality and don’t forget to turn it back on to stay protected from viruses 9.Microsoft windows has an automatic firewall that comes with your computer. But you can use any fire wall you want How to use fire wall

conclusion As we saw the firewall software is essential part of the computer defense against malware (viruses, trojans, rootkits, spyware, adware) and direct malicious attacks both from outside and inside of your computer. The good firewall software must be able to provide full network protection without sacrificing the speed of your computer and your network access. In order to be safe, keep in mind the following things.