Skip to main content

 

Data security week 6 blog


Configuration of firewall and I had to keep your device safe using firewall

There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have  annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked.

By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode:

High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and compromising your computer protection. Unknown networks and most wireless networks, even secured wireless networks, should be in this High security Public Zone.

Medium security mode for Trusted Zone protects your computer from possible attacks on Windows networking services, but lets you share resources with other computers on the network. Networks you know and trust, such as your home or business LAN and known protected wireless networks, should go in this Medium security Trusted Zone.

Blocked Zone - contains computers and networks you distrust. No traffic to or from this zone is allowed.

The ZoneAlarm Firewall is on by default as soon you as install ZoneAlarm software. You do not need to do anything, unless you want to change the default configuration, or to turn it off temporarily. To learn how to change the default Firewall configuration, see Managing Basic Firewall Zone Settings.

 

Your firewall whitelist contains people, sites or networks you allow access to your computer or you want your computer to access. The opposite of whitelists are blacklists. You blacklist or deny access to services you don't want such as sites that might try to add spyware to your computer.

Firewall Configuration

 

Step 1

Once you have opened the ZoneAlarm programme you will see a list of options similar to below:

Click Antivirus & Firewall to have access to the Firewall.




 

Step 2

Click Advance Firewall or View Zones to set up the Whitelist.





Step 3

When the Whitelist is open click add to insert the IP you want to trust or not.




Step 4

Click IP address.










Step 5

I will show an example of IP address Will react when the zone is on trusted.



Step 6

The result shows when IP address is trusted the website will work.



Step 7


Let's see what happens when I said the zone too blocked, I am going to use the same steps. First I'm going to add another IP address.



Step 8

now I am going to try to block YouTube let's see the results as you can see I have set the zone to blocked and I've entered the IP address of YouTube and then I'm going to click OK.



Step 9


now you can see You Tube has been blocked when I entered IP address 216.58. 213.14



 



Comments

Popular posts from this blog

 Data security week 5 blog   Intrusion Detection Systems What is Intrusion Detection Systems? Intrusion Detection Systems or in short form IDS. Am going to refer to Intrusion Detection Systems as IDS. IDS is a network security tool that is used to for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies. IDS monitors network traffic for unusual or suspicious activity and sends an alert to the administrator user. Detection of anomalous activity and reporting it to the network administrator is one of the main functions however, some IDS software can take action based on rules when malicious activity is detected, like blocking certain untrustworthy incoming traffic. IDS can be host based or network-based systems.   How can IDS protect your ne...
Data security firewall  What is a firewall? A firewall is network security device or software that monitors incoming and outgoing network traffic, it permits, or blocks network traffic data packets based on a set of security rules . The purpose of the firewall is filter out any malicious traffic like viruses and hackers and tonight access to the viruses and hackers, and it will allow safe network traffic through such as the Internet. By default, a firewall blocks all network traffic coming into the network it is protecting.  For the campus firewall this means that no traffic from the Internet can get on the Missouri State campus network without explicit permission.  To permit traffic through the firewall we create exceptions or rules that allow certain traffic on the network.  The rules are defined by the IP addresses of the sender and receiver of the traffic as well as the type of traffic e.g. web or SSH.  Types of firewalls Firewalls can either be soft...

My home workout!!

I am no way a professional or a athlete but I have been keeping up with a routine that works for me. I have been into training since 2015, I have a very small home gym which contains:- A bench  Wights up to 20kg Dumbbell Dip and pull up machine  Mats   Today we are going over my Upper Body Push day :- First for a warm up 5 minute skipping. High knees skipping  Push up 5- 10 Stretch your upper body    Then right into the main workout:-  Close-Grip Bench Press - 4 sets x 10, 8,8,6 reps  with 60 seconds rest Incline Dumbbell hammer- grip press 4 x set 8 reps with 60 second rest  Dumbbell rear delt raise - 4 sets x 12 with 60 seconds rest  Skull crusher - 4 sets x 10,8,8,6 with 60 seconds rest  Decline Push up - 4 set between 10-15 with second rest Arnold Press - 4 sets 8 reps with seconds rest  Body-weight Dips - 4 sets reps Max out 60 seconds rest Cool Down :-  5 minutes walk a...