ANTI HACKING by MohanMassIndia

VIEWS: 62 PAGES: 6

More Info
									              ANTI-HACKING

                              ABSTRACT

ABOUT ANTI-HACKING:

  • Anti-hacking involves the prevention of unauthorised access of data.
     The methods of preventing hacking : FIREWALL,SOFTWARE

GENERATION OF FIREWALL:

  • FIRST GENERATION:- The first paper published on firewall
     technology was in 1988, when engineers from digital equipment
     corporation (DEC) developed filter systems known as packet filter
     firewalls.

  • Packet filters act by inspecting the “packets” which represent the basic
     unit of data transfer between computers on the internet..

   SECOND GENERATION :-From 1980 -1990 there colleagues from
     AT & T BELL laboratories , Dave Presetto, developed the second
     generation of firewalls,calling them circuit them “circuit level firewalls.

   THIRD GENERATION – APPLICATION LAYERFirewall known as
     an application layer firewall, also known as a “proxy – based firewall”.
       Marcus Ranum’s work on the technology spearheaded the creation of
       the first commercial product.




BASIC TYPES OF FIREWALLS



  • Network layers
  • Application layers
  •    Hybrids (proxy)
PROXY SERVERS
  • A proxy server (sometimes referred to as an “application gateway “or
       forwarder) is an application that mediates traffic between a protected
       network and the Internet.Proxy servers are application specific. In order
       to support a new protocol via a proxy, a proxy must be developed for
      Some firewalls permit only email traffic through them, thereby
      protecting the network against any attacks
  • Generally, firewalls are configured to protect against unauthenticated
       interactive logins from the ``outside'' world. Firewalls are also
       important since they can provide a single ``check point'' where security
       and audit can be imposed etc.Because of this, firewall logs are critically
    important data. They can be used as evidence in a court of law in most
    countries.
 • We should safeguard, analyze and protect our firewall logs accordingly.
    Some firewalls permit only email traffic through them, thereby
    protecting the network against any attacks Because of this, firewall logs
    are critically important data. They can be used as evidence
   in a court of law in most countries. We should safeguard, analyze and
   protect your firewall logs accordingly.


HISTORYOFFIREWALL:
   The term "firewall" originally means a wall to confine a fire or potential
   fire within a building, c.f. firewall (construction).
   Later uses refer to similar structures, such as the metal sheet separating the
   engine compartment of a vehicle from the passenger compartment.
   Internet was a fairly new technology in terms of its global use and
   connectivity. The original idea was formed in response to a number of
   major internet security breaches, which occurred in the late 1980s. In 1988
   an employee at the NASA Ames Research Center in California sent a
  memo by email to his colleagues that read,
WORKING OF FIREWALL:
HowFirewallsWork?
Basically, a firewall is a barrier to keep destructive forces away from your
property. In fact, that's why its called a firewall. Its job is similar to a physical
firewall that keeps a fire from spreading from one area to the next .
WhatFirewallactuallyDo/Act?
A Firewall works similar to a door.It lets good things in and keeps the bad
thingsout.
Good firewalls will actively block any malicious incoming traffic while still
allowingyoutousetheinternet                                                             .
Most firewalls will also prevent your computer from connecting to unwanted
servers and from sending personal data to other computers or internet sites.
   APPLICATIONS OF FIREWALL
   • These generally are hosts running proxy servers, which permit no traffic
       directly between networks, and which perform elaborate logging and
       auditing of traffic passing through them. Since the proxy applications
       are software components running on the firewall, it is a good place to
       do lots of logging and access control.
    • Application layer firewalls can be used as “network address
       translators”, since traffic goes in one ``side'' and out the other, after
       having passed through an application that effectively masks the origin
       of the initiating connection.
    • Having an application in the way in some cases may impact
       performance and may make the firewall less transparent. Early
       application layer firewalls such as those built using the TIS firewall
       toolkit, are not particularly transparent to end users and may require
       some training.
    • Modern application layer firewalls are often fully transparent.
       Application layer firewalls tend to provide more detailed audit reports
       and tend to enforce more conservative security models than network
       layer firewalls.


    ADVANTAGES
•   Some firewalls permit only email traffic through them, thereby protecting
    thenetwork against any attacks
• Generally, firewalls are configured to protect against unauthenticated
    interactive logins from the ``outside'' world.
• Firewalls are also important since they can provide a single ``check point''
    where security and audit can be imposed. etc.
• Because of this, firewall logs are critically important data. They can be
    used as evidence in a court of law in most countries.
DISADVANTAGES
•   Why can't a firewall fully protect against?
• Firewalls can't protect against attacks that don't go some attention of the
    system.
• Another thing a firewall can't really protect you against is traitors or
    idiots inside your network.
 Lastly, firewalls can't protect against bad things being allowed through
    them., only 80% it can detect the unwanted information
• Some firewalls permit only email traffic through them, thereby
    protecting the network against any attacks ,analyze and protect your
    firewall logs according .

								
To top