ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Due to the increasing threat of network attacks, Firewall has become crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each packet that passes through it and decide whether to letting them pass or halting them based on preconfigured rules and policies, so firewall now is the first defense line against cyber attacks. However most of people doesn't know how firewall works, and the most users of windows operating system doesn't know how to use the windows embedded firewall. This paper explains how firewall works, firewalls types, and all you need to know about firewall policies, then presents a novel application (QudsWall) developed by authors that manages windows embedded firewall and make it easy to use.
VI. CONCLUSION
Firewalls are really substantial in any secure network, however using firewalls is necessary and not sufficient. Because firewalls can't protect against attacks that don't go through the firewall for example internal attacks, and can not defend against social engineering attacks that's why you must use so many security system (IDS, UFW, DMZ, Antiviruses..) in order to maintain your network security. however if you didn't switched on and properly configure your computer firewall you will be exposed to cyber attacks. We have succesfully implemented controlling the windows embedded Firewall with the application QudsWall using C#. The application has been tested in the live local network at the Polydisciplinary Faculty of Ouarzazate. Future work includes extension of this application to cover all windows security components, and make it powerful as possible. For specific information regarding IT security, and how to protect yourself from cyber attacks, consult our paper titled "Review On The IT Security: Attack And Defense"[10].