unit 5
unit 5
HISTORY OF FIREWALL :
Before Firewalls, network security was performed by Access
Control Lists (ACLs) residing on routers. ACLs are rules that determine
whether network access should be granted or denied to specific IP
address. But ACLs cannot determine the nature of the packet it is
blocking. Also, ACL alone does not have the capacity to keep threats
out of the network. Hence, the Firewall was introduced. Connectivity
to the Internet is no longer optional for organizations. However,
accessing the Internet provides benefits to the organization; it also
enables the outside world to interact with the internal network of the
organization. This creates a threat to the organization. In order to
secure the internal network from unauthorized traffic, we need a
firewall.
Types of Firewall :
Firewalls can be categorized based on their generation.
VIRUSES :
A virus is a fragment of code embedded in a legitimate program.
Viruses are self-replicating and are designed to infect other programs.
They can wreak havoc in a system by modifying or destroying files
causing system crashes and program malfunctions. On reaching the
target machine a virus dropper inserts the virus into the system.
Various types of viruses:
1.File Virus:
This type of virus infects the system by appending itself to the end of
a file. It changes the start of a program so that the control jumps to
its code. After the execution of its code, the control returns back to
the main program. Its execution is not even noticed. It is also called
a Parasitic virus because it leaves no file intact but also leaves the
host functional.
2.Boot sector Virus:
It infects the boot sector of the system, executing every time system
is booted and before the operating system is loaded. It infects other
bootable media like floppy disks. These are also known as memory
viruses as they do not infect the file systems.
3.Macro Virus:
Unlike most viruses which are written in a low-level language(like C or
assembly language), these are written in a high-level language like Visual
Basic. These viruses are triggered when a program capable of executing a
macro is run. For example, the macro viruses can be contained in
spreadsheet files.
It looks for source code and modifies it to include virus and to help spread it.
5.Encrypted Virus:
6.Stealth Virus:
It is a very tricky virus as it changes the code that can be used to detect it.
Hence, the detection of viruses becomes very difficult.
7.Directory Virus:
This virus is also called called File System Virus or Cluster Virus. It infects the
directory of the computer by modifying the path that is indicating the
location of a file.
8.FAT Virus :
The File Allocation Table is the part of the disk used to store all
information about the location of files, available space , unusable
space etc.
This virus affects the FAT section and may damage crucial
information.
Digital Certificate
Digital certificate is issued by a trusted third party which proves
sender’s identity to the receiver and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority
(CA) to verify the identity of the certificate holder. Digital certificate is
used to attach public key with a particular individual or an entity.
Digital certificate contains
Name of certificate holder.
Serial number which is used to uniquely identify a certificate,
the individual or the entity identified by the certificate
Expiration dates.
Copy of certificate holder’s public key.
Digital Signature of the certificate issuing authority.
Digital certificate is also sent with the digital signature and the
Advantages of Digital Certificate
1.NETWORK SECURITY :
Complete, layered strategy is required by modern cybersecurity
methods, wherein many solutions cooperate to offer the highest level
of protection against malevolent actors. An essential component of
this puzzle is digital certificates, which offer strong defence against
manipulation and man-in-the-middle assaults.
2.VERIFICATION : Digital certificates facilitate cybersecurity by
restricting access to sensitive data, which makes authentication a
crucial component of cybersecurity. Thus, there is a decreased
chance that hostile actors will cause chaos. Compared to other
popular authentication methods like biometrics or one-time
passwords, certificates are flexible.
3.BUYER SUCCESS : Astute consumers demand complete assurance
that the websites they visit are reliable. Because digital certificates
are supported by certificate authority that users’ browsers trust, they
offer a readily identifiable indicator of reliability.
Disadvantages of Digital Certificate :
1.Phishing attacks: To make their websites look authentic,
attackers can fabricate bogus websites and obtain certificates. Users
may be fooled into providing sensitive information, such as their login
credentials, which the attacker may then take advantage of.
2. Weak encryption: Older digital certificate systems may employ
less secure encryption methods that are open to intrusions.
3.Misconfiguration: In order for digital certificates to work, they
need to be set up correctly. Websites and online interactions can be
attacked due to incorrectly configured certificates