D-Link DFL-80 User Manual - Page 127

Firewall, Hackers and Crackers

Page 127 highlights

Firewall The firewall has three basic functions: 1. Restrict data to enter at a control point. 2. Restrict data to flow out at a control point. 3. Keep attackers away from servers. Firewall protects: 1. Software data 2. Hardware data 3. Company's reputation Firewall's standard interfaces are 1. External (WAN) network also known as Untrusted Network 2. Internal (LAN) network also known as Trusted Network 3. DMZ network also known as De-Militarized Network Add-on values of firewall are: 1. NAT to provide company with enough IP addresses. 2. Reduce the risk of exposing server to the outside world. 3. Record Internet usages effectively 4. Alarm the administrator to take emergency step in a timely fashion 5. Encrypt sensitive data to transfer them safely across internet Firewall has following restriction: 1. Can't block hackers' attacks from inside. 2. Can't monitor connection that doesn't pass through firewall 3. Can't prevent new type of threats. 4. Can't prevent virus's attacks. Hackers and Crackers Hackers are those smart and aggressive programmers who actually initiate the recent computer revolution. These programmers are crazy about exploring new technology to solve problems and create new methodologies. Their objectives are to construct solid networks and not to destroy other computer systems. Crackers on the other hand are programmers who attack private networks, but don't steal or destroy data. Phrackers are people who use stolen data to enter computer systems illegally to make damage. 127

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147

127
Firewall
The firewall has three basic functions:
1.
Restrict data to enter at a control point.
2.
Restrict data to flow out at a control point.
3.
Keep attackers away from servers.
Firewall protects:
1.
Software data
2.
Hardware data
3.
Company’s reputation
Firewall’s standard interfaces are
1.
External (WAN) network also known as Untrusted Network
2.
Internal (LAN) network also known as Trusted Network
3.
DMZ network also known as De-Militarized Network
Add-on values of firewall are:
1.
NAT to provide company with enough IP addresses.
2.
Reduce the risk of exposing server to the outside world.
3.
Record Internet usages effectively
4.
Alarm the administrator to take emergency step in a timely fashion
5.
Encrypt sensitive data to transfer them safely across internet
Firewall has following restriction:
1.
Can’t block hackers’ attacks from inside.
2.
Can’t monitor connection that doesn’t pass through firewall
3.
Can’t prevent new type of threats.
4.
Can’t prevent virus’s attacks.
Hackers and Crackers
Hackers are those smart and aggressive programmers who actually initiate
the recent computer revolution. These programmers are crazy about
exploring new technology to solve problems and create new methodologies.
Their objectives are to construct solid networks and not to destroy other
computer systems.
Crackers on the other hand are programmers who
attack private networks, but don’t steal or destroy data.
Phrackers are
people who use stolen data to enter computer systems illegally to make
damage.