0% found this document useful (0 votes)
165 views15 pages

Firewall PDF

This document provides information about a student's report writing skills assessment. It includes the student's name, program of study, preferred language, years of language learning experience, which aspect of writing they find most difficult, and how they plan to improve. It notes that the student would appreciate feedback from tutors to help with reflection, learning, and research. The document asks the student to demonstrate their understanding of what a report is, the importance and types of reports, and report format and structure. It inquires about the sources the student plans to use and asks them to explain their preparation process for the task.

Uploaded by

Abhinav Aha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views15 pages

Firewall PDF

This document provides information about a student's report writing skills assessment. It includes the student's name, program of study, preferred language, years of language learning experience, which aspect of writing they find most difficult, and how they plan to improve. It notes that the student would appreciate feedback from tutors to help with reflection, learning, and research. The document asks the student to demonstrate their understanding of what a report is, the importance and types of reports, and report format and structure. It inquires about the sources the student plans to use and asks them to explain their preparation process for the task.

Uploaded by

Abhinav Aha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Report Writing

Candidate’s Data:
1.Name:BHANU VARDHAN REDDY
2.Programme: B.Tech
3.Medium of Instruction:ENGLISH
4.No of Years of language learning:14
5.Which aspect of writing skills do you feel difficult?
a.Grammar b.Organization c. Vocabulary d. Planning
6.How are you going to improve?
I would like to improve my planning skills by concentrating more on planning, doing more tasks on it,
being proactive, by making a schedule by being an early bird, by establishing a filing system, by making
most out of my prime time and also minimizing interruptions by learning delegate.
7.Do you appreciate if you get feedback from your tutors and if they use this for
reflection/learning/research purposes? Yes.

Evidence of learning
In this part you are required to produce what you learnt during the course.
What is your understanding of a report? Write about the importance, types, format and structure of a
report. Why do people prepare reports? Before you started to write your report, how did you prepare
yourself for the task? What are the sources that you are going to access and refer?
A report is a document containing information organized in a narrative, graphic, or

Tabular form, prepared on ad choc, periodic,recurring,regular, or as required basics.

Reports may refer specific periods, events, occurrences,or subjects,and may be communicated or
presented in oral or written form.

IMPORTANCE OF REPORT
The importance of report is the ability to write report clearly,quickly and accurately

Is one of the key requirements of managers at every level .reports are an extremely

Important methods for communication within an organization. The thoughts expressed

In reports are regularly utilized as a reason for action or to make a decision of some sort.

Types of report:

. Formal or informal reports

.short or long reports

.informational or analytical reports

.proposal report

.vertical or lateral report

.internal or external report

.periodic report

.functional report

FORMAT OF REPORT

.Title section

.summary
.introduction

.body

.conclusions

.recommendations

.appendices

STRUCTURE OF REPORT

.title page

.executive summary

.table of contents

.introduction

.body

.conclusion

.reference list

.appendix

PURPOSE OF REPORT:
The purpose of reports. Reports communicate information which has been compiled as a result of a
research and analysis of data of issues. The inclusions of recommendations is one reason why reports
of common form of writing is industry,as

The informed recommendations are use full for decision making.

At starting for writing a report we need to know what is report the basic definition of

Report what are the types of report. If you are writing a report in which format you are writing a
report you need to choose a format of report. I will access the information from the goggle and
analyse it and I will prepare my report.

Reports communicate information which has been compiled as a result of research and analysis of data
and of issues. Reports can cover a wide range of topics, but usually focus on transmitting information
with a clear purpose, to a specific audience. Good reports are documents that are accurate, objective
and complete. They should also be well-written, clearly structured and expressed in a way that holds
the reader's attention and meets their expectations. The true value of the research may be assessed
through a report since the written report may be the "only tangible product of hundreds of hours of
work. Rightly or wrongly, the quality and worth of that work are judged by the quality of the written
report - its clarity, organization and content" (Blake & Bly, 1993: 119). Often reports are structured in a
way that reflects the information finding process and the writing up of the findings: that is, summary of
the contents, introduction or background, methods, results, discussion, conclusion and/or
recommendations. The inclusion of recommendations is one reason why reports are a common form of
writing in industry, as the informed recommendations are useful for decision making.

Max 1000words Word length:

Part -2

What did you discuss with your mentor regarding your project? Present his ideas , suggestions and the
gist of the interaction here.

My mentor is Dr. Anjana Matta. The topic I choose to write was Google App Engine. My mentor gave
me so many ideas, concepts and information regarding my report. My mentor gave a brief description
about the topic. My mentor showed me a couple of previously written reports for my reference. I got
a clear idea about my report and I learned how to write an effective report. I along with my mentor
have tried to develop and host the internet applications in Google. My mentor suggested me to refer
many books and also few useful link address which were very useful for my report. We discussed the
systematic organization of the points that I have collected and also sorted the useful and important
information. He suggested me to plan and prepare properly for the report. He advised me the
different ways of implementing our topic chosen for report and also suggested me that the main idea
and the objectives should be presented in an effective way

In this part you have to present about your study.

What is the main idea of your report? Is it a problem -solving, compare and contrast, cause and effect,
describing a personal event/description report? Why did you choose so? What is the purpose of this
study? How important and to whom is this project useful? How are you going to start your project?
Present a timeline for this in the form of a table.

MAIN IDEA
In computing, a firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. A firewall typically establishes a
barrier between a trusted internal network and UN trusted external network, such as the Internet.
IMPORTANCE OF FIREWALL SECURITY
Fire wall security system is problem solving Almost every medium and large-scale organization has a
presence on the Internet and has an organizational network connected to it. Network partitioning at
the boundary between the outside Internet and the internal network is essential for network security.
Sometimes the inside network (intranet) is referred to as the “trusted” side and the external Internet
as the “UN-trusted” side.

My email was hacked years ago. The hacker had been accessing my account few weeks before I
found out. Neither of the former acquaintance said a word. In fact they conversed with the hacker
back and forth without my noticing it. The hacker was deleting the emails from the inbox and I rarely
check and sent folder.

One weekend morning, a friend call me to say he was getting strange messages

From y email addresses. He said my account has been compromised that morning

Some one has sent a mass email from my account with pictures, personal correspondences and my
password with an invitation to every one to access my account. When I opened my email, I discovered
that the person had forwarded the information not only to friends but also for family, including my
aunt. I was devastated..

The Importance of having Firewalls! Firewall is a software or hardware device that protects your
computer from being attacked over the internet by hackers, viruses, and worms. This may occur
either at a large corporate network, or simply at a small home network; both have the same security
issues.

Firewall is a software or hardware device that protects your computer from being attacked over the
internet by hackers, viruses, and worms. This may occur either at a large corporate network, or simply
at a small home network; both have the same security issues.
Having a firewall in each company’s internet connection allows the business to setup online rules for
the users. For example, with the firewall the company can control the access to certain websites,
giving it the control of how employees use the network. These are the different ways of how a
firewall controls the online activities:

Packet filtering: small amount of data is analyzed and distributed according to the filter’s standards. .

Proxy service: online Information is saved by the firewall and then sent to the requesting system.

Stateful inspection: matches specific details of a data packet to a database of reliable information.

This project is use full to every citizen who is living in a virtual world. Every citizen who containing a
private data which is his/her and his company. This project is use full for every human being for a
secure life.

Max 100 words Word length:


Part -3

In this section you need to present an extended abstract. You have to cover, the main objective, tools,
research design (Whether qualitative or quantitative), research procedure, subjects if any, research
outcomes of this project.

EXTENDED ABSTRACT:

The quickly growing threat landscape and ever-changing security risks need a preventive and
industry-specific defense strategy. The visions of Industry 4.0 and the Internet of Things (IoT) involve
the next development stage of connectivity and interaction between the virtual and physical worlds.
The word firewall originally referred virtually to a wall, which was constructed to halt the spread of a
fire. In the world of computer firewall protection, a firewall refers to a network device which blocks
certain kinds of network traffic, forming a barrier between a trusted and an untrusted network. It is
analogous to a physical firewall within the sense that firewall security makes an attempt to dam the
unfold of pc attacks.

Firewalls square measure usually categorized as either network firewalls or host-based firewalls.
Network firewalls filter traffic between 2 or additional networks and run on network hardware. Host-
based firewalls run on host computers and control network traffic in and out of those machines.
Firewalls called next-generation firewalls (NGFW), work by filtering network and Internet traffic based
upon the applications or traffic varieties victimization specific ports. Next Generation Firewalls
(NGFWs) mix the options of a customary firewall with quality of service (QoS) functionalities so as to
supply smarter. This document enumerates and illustrates a specific set of grid eventualities that
encounter some problems once addressing firewall styles of devices. The data and knowledge
gathered through these use-cases are used to classify the problems into homogeneous classes that
may be utilized by grid application developers and personnel as steerage. These classes are
accustomed to propose new or advocate existing tutorial and/or standards primarily based solutions
to the grid community.

RESEARCH DESIGN :
RESEARCH PROCEDURE:

, Clear OS was used as a server for a small business organization with 3 different zones: Internet, Local
and DMZ. The case study used two topologies one is the consumption topology (Figure 13), which
describes the actual organization infrastructure and one is the demo topology which is used in the
experiment.

Max words:300-500 Word Length:

Part -4

In this section you have to cover the following aspects while you present the report.
Brief Introduction, objectives, research design, tools, procedure, field study, measures, analysis, results,
implications, scope for further study and conclusion.

INTRODUCTION:

Almost every medium and large-scale organization has a presence on the Internet and has an
organizational network connected to it. Network partitioning at the boundary between the outside
Internet and the internal network is essential for network security..A firewall is a system designed to
prevent unauthorized access to or from a private network. Sometimes the inside network (intranet) is
referred to as the “trusted” side and the external Internet as the “UN trusted” side You can implement a
firewall in either hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet, especially
intranets. All messages entering or leaving the intranet (the local network to which you are connected)
must pass through the firewall, which examines each message and blocks those that do not meet the
specified security criteria.
An application gateway actually relays TCP segments between the two TCP connections in the two
directions (Client ↔ Proxy ↔ Server).
For outbound packets, the gateway may replace the source IP address by its own IP address. The
process is referred to as Network Address Translation (NAT). It ensures that internal IP addresses are
not exposed to the Internet.
Firewalls cane be either hardware or software but ideal with configuration of both.in addition in
limiting access computer and network, a firewall is also useful for following remote access to a private
network through secure authenticates certificates and login.
Hardware firewalls can be purchased as stand-alone products but are typically found in broadband
routers and should be considered as important part of your system security and network set up. Most
hardware firewalls will have minimum of 4 network ports to connect other computers but for larger
networks a business networking firewall solution is available.
OBJECTIVE:

The fundamental objective is to provide differing levels of security of the connected networks. So, if a
part of the network requires a greater level of security and differing security policies, you put a firewall
to monitor and control its connection to a different security level. So, if you have an intranet that is
connecting to the Internet, then the firewall is meant to preserve the intranet security levels and
policies. The primary purpose of a firewall is packet filtering. When a computer sends a request across
the Internet, it takes the form of small packets of data, which travel through the network to their
destination. You may also have differing levels of security needed for different parts of the intranet as
well, such as for a secured data center and the employee network. This can also be done with a
firewall.The target server responds with its own packets of data, which return along the same route. A
firewall monitors every packet that passes through it, considering its source, destination and what type
of data it contains, and it compares that information to its internal rule set .

Firewall is mainly an access control device and slowly and gradually it evolve into doing lot more than
just access control, like application level inspection etc etc. Think of firewall as a badge scanner in
your office building. The reason they have this, is to control and stop people without their badge (or
strangers).Another important aspect of a firewall is its ability to log any traffic that passes through it.
By recording the information from packets that pass through or that it discards, it can provide you with
a clear picture of the kind of traffic your system experiences. This can be valuable in identifying the
source of an external attack, but you can also use it to monitor your employees’ activities online to
prevent lost productivity. This can do so much in blocking, but unfortunately piggy backing happen
most of the time and badge system fails. Similarly in case of firewall, you try to give access to the users
who are authorized yet you don't know what they are carrying in their devices.Less theoretically, a
firewall is used most often to protect a network from the other networks it is connected to and will do
protocol filtering, Stateful inspection of packets, policy enforcement, application proxying, and other
tasks such as providing a virtual private network (VPN) connection.

other features like application layer firewall helps, or IPS to identify any malware and block. In this
era of virtualization, by deploying only the perimeter firewall (usually a physical appliance) is not
going to cut through, since a lot more communication is happening east/west at the virtualization layer.
Many types of malware will send out a signal once they take over a system, allowing the author to
trigger specific actions or even control the computer remotely.To protect this kind of traffic within the
environment, you may need to consider virtual firewall.

RESEARCH DESIGN:
TOOLS :

.Astaro firewall ASG.


.check point firewall, edge x firewall.
.Cisco FWSM(firewall services module).
.e soft: Instigate firewall 404,604,806.
.Microsoft windows firewall.
.polo alto firewall: PA-2000, PA-4000,PA-500 series.
.sonic wall firewall.

FIELD STUDY:

One of the best defense mechanisms for network security is the firewall network security. This
firewall is a system designed to prevent unauthorized access to or form a private network. Companies
can implement a firewall in either a hardware or software form or a combination of both. The network
firewall is an important piece of equipment that protects your network from hackers and other cyber
criminals. Its use is essential if your business is connected to the internet, and its highly recommended
for residential users too.

An access policy is simply a set of rules that determine who gets in or out of your network and who
doesn't. Firewall access policies are created by firewall administrator's , who are it experts that know
and understand how to setup the firewall to protect your network. Firewalls are also used to segment
your network into places called zones. Zones are smaller chunks of your network that share similar
attributes. Going back to your fancy apartment analogy, the doorman knows that residents go to the
elevators, employees go to the door on the right , guests go to the registration desk to check in , and the
bad crowd stays out.

MEASURES :

SSH keys are a pair of cryptographic keys that can be used to authenticate to an ssh server as an
alternative to password based-login. A private and public key pair are created prior to authentication.
The private key is kept secret and secure by the user, while the public key can be shared with anyone.
By the most common security measure these days is firewall. A lot of confusion surrounds the concept
of a firewall, but it basically be defined as an perimeter device that permits or denies traffic based on
set of rules configured by the administrator. Thus, a firewall may be as simple as a router with access
lists or as complex as a set of modules distributed through the network controlled from one central
location.

To configure the ssh key authentication ,you must place the users public key on the server in a special
directory. When the user connects to the server, the server will ask for proof that the client has
associated private key. The SSH client use the private key respond in way that proves ownership of the
private key. The server will then let the client connect without a password. To learn more about how
SSH keys work , check out article here. These are the packages meant for individual desktops and are
fairly easy to use . The first thing they do is make the machine invisible to pings and other network
probes. Most of them also let you choose what programs are allowed to access the internet. Therefore
you can allow your browser and mail client , but you seem any suspicious program trying to access the
network, you can disallow it.

ANALYSIS:

Analyze Security and Traffic Logs. Firewall log analysis provides insight in to the security threats and
traffic behavior analysis of traffic logs provides valuable information about bandwidth usage, employee
internet usage, bandwidth guzzling web sites, and interface wise traffic. Analysis of firewall
configuration provides information about wrong configurations, sub-optimal configurations, etc. With
this information, the administrator will be able to correct / fine tune the configurations for optimum
firewall performance
Firewall logs analysis reveals a lot of information Deeper analysis of the policies/rules provides
information about the frequency. This information can be used by the security / network administrators
to find out the adequacy of the rules, requirement of a particular rule, rule usage resulting in security
policy implementation. From the rules / policy reports of firewall analysis, the administrator can decide
whether to delete unused rules, modify the moderately used rules and add new rules to meet the
security policy requirements.
Analysis of firewall configuration provides information about wrong configurations, sub-optimal
configurations, etc. With this information, the administrator will be able to correct / fine tune the
configurations for optimum firewall performance.Firewall analysis can be split broadly in one two
categories. One , the operation of firewall captured in security and even logs .the other is the
administration of firewall captured in configurations, policies and rule files.
RESULTS :

Security is a major issue for organizations, both the legal issues associated with computer and network
security as well as its implementation. Threats such as malware and Denial of Service (DoS) constantly
test organizations security. [1], have described a security scheme as a formal proclamation of the
guidelines by which individuals who are offered access to an organization‘s technology and data
resources must tolerate.Firewalls are essential components in improving network security. Most
firewalls are deployed at the edge of the network to filter legitimate traffic, and can be deployed in the
core of the network to further supplement and protect the capability of the network and the application
running over the network to deliver required services to the end user. Firewalls have become
increasingly complex, evolving from offering traditional firewall capabilities to protect networks, to
offering application-aware processing of several Internet protocols.

The three scenarios simulated in this research were evaluated based on: i. No Firewall scenario where
there is no firewall security imposed on the network, so all the applications that generated the required
traffic across the distributed system are allowed to pass through the router. ii. Firewall scenario where a
firewall is imposed to filter some packet of the other application iii. The third scenario like the firewall
with blocking capability where the ftp applications are blocked.Firewalls work by inspecting different
fields in headers of the packet, finding the matching rule and doing the action specified in the rule.
Common firewalls (and rules) examine at least IP addresses, next protocol type (TCP or UDP) and in
case of TCP or UDP their respective port numbers. That usually gives five different variables (source
& destination address, protocol, source & destination port) to work with. [Optimizing firewall
performance]. [Performance analysis of the Linux firewall in a host]. As example ,a firewall that
operates at only Layers 3 or 4 can filter only on IP protocol information, IP addresses, and TCP or
UDP port numbers; it cannot filter on application information such as user authentication or commands
that a user enters. Therefore, the more layers a firewall can process information from, the more
granular it can be in its filtering process. [cisco press – cisco router firewall security]

The performances of the web and email applications were analyzed based on the performance metrics
chosen for three levels namely; global level, node level and link level. The results obtained, were
compared against the performance metrics and a detailed analysis
IMPLICATIONS :

As part of the overall security plan, a firewall restricts access from one network to another network,
with the goal of reducing or preventing the spread of unwanted or malicious programs or data. To do
this, firewalls have developed capabilities roughly related to the three generations of firewalls: Packet
Filtering, Circuit-Level (Stateful Packet Filtering), and Application Layer Firewalls. As firewalls
enforce the information access policy, it is important for librarians to enter the discussion at early
levels. In addition, an understanding of firewalls may help the librarian in diagnosing problems with
patrons connecting to the information resources.Think of the Internet as a network of roads where
trains move around to pick up and deliver passengers. All trains can go in only one direction and they
move from train station to train station, and on every station, passengers get on and off the train to
move into the direction they need to move. And at each station, the passenger has to check which train
he needs to take next.
Conclusion:
The network design appropriate for your environment depends on the nature of your application and
the risks that you are trying to mitigate by setting up a security perimeter around your servers. As we
discussed, relying on a single firewall or combining application tiers into a single subnet often
decreases the amount of control that you have over how application components are accessed.As the
Internet becomes more a part of business, firewalls are becoming an important ingredient of an overall
network security policy. We have seen that there are several approaches to integrating a firewall into a
network topology. We've also found that there are many possible criteria upon which decisions are
made regarding whether to implement a firewall, and if so, which one. Generally, performance, feature
set (that is, does this product provide security in the ways that is most needed) and how well the
product fits into the current network infrastructure are the most important issues. The firewall market is
still relatively young and there are an abundance of choices (approximately 40 vendors currently offer
products), so it is expected that as the market matures, the products that are successful are those that
excel in these areas.

Max :1800-2000 words Word Count:

References:

Mention any of the four sources like books /articles/videos, that you referred for this study.

www.google.com
www.wikipedia.com
www.scribd.com

You might also like