Saturday, May 26, 2018

Firewall and its type


What is a Firewall? Explain Hardware and Software Firewall
Firewall
Firewall is a software or hardware or combination of both hardware and software. A private network (LAN) connected to the internet is in high risk to intrusion by unauthorized users on the internet. To protect the information from being leaked, all the messages or communication entering or leaving the private network must pass through a firewall which authenticates the traffic based on set policies or security criteria. Firewall is system that protects a private network from internet by filtering the incoming and outgoing messages based on security mechanism as set by administrator. The firewall can be a software application or it can be in the form of a hardware device.
Hardware Firewall
It is a hardware device that is placed between internet and intranet (LAN). It is a standalone device that is configured to protect multiple systems in an organization. An example of a simple hardware firewall is a broadband router and there are professional high-cost hardware firewalls also called UTM (unified threat management) that provides a single management console to monitor various security related applications. UTM firewall provides intrusion protection, anti-virus, anti-malware, spam, VPN and content filtering in a single console. Only IT professionals can configure and manage these UTM firewalls


Software Firewall
For a home or small networks, you can use software firewalls which can be installed on individual systems or a server. Software firewalls are easy to install and update as compared to their hardware counterparts. Even if there is a hardware firewall installed in your office, you must install a software firewall since a hardware firewall works only in your office (LAN) and if you are traveling or working outside your office, it is the software firewall that will provide protection to your system from external threats.
A basic software firewall is available free with windows operating system but you can also buy advanced software firewalls like McAfee, Norton Internet security, Bitdefender internet security or Kaspersky internet security.
Types of Firewall

Packet filtering firewalls 

This firewall doesn't route packets, but instead compares each packet received to a set of established criteria -- such as the allowed IP addresses, packet type, port number, etc. Packets that are flagged as troublesome are, generally speaking, unceremoniously dropped -- that is, they are not forwarded and, thus, cease to exist. This, the original type of firewall, operates inline at junction points where devices such as routers and switches do their work.

 Circuit-level gateways 

Using another relatively quick way to identify malicious content, these devices monitor the TCP handshakes across the network as they are established between the local and remote hosts to determine whether the session being initiated is legitimate -- whether the remote system is considered trusted. They don't inspect the packets themselves, however.

Stateful inspection firewalls

State-aware devices, on the other hand, not only examine each packet, but also keep track of whether or not that packet is part of an established TCP session. This offers more security than either packet filtering or circuit monitoring alone, but exacts a greater toll on network performance.
A further variant of stateful inspection is the multilayer inspection firewall, which considers the flow of transactions in process across multiple layers of the ISO Open Systems Interconnection seven-layer model.

Application-level gateways 

This kind of device, technically a proxy, and sometimes referred to as a proxy firewall, combines some of the attributes of packet filtering firewalls with those of circuit-level gateways. They filter packets not only according to the service for which they are intended -- as specified by the destination port -- but also by certain other characteristics, such as the HTTP request string.
While gateways that filter at the application layer provide considerable data security, they can dramatically affect network performance.

Friday, May 4, 2018

OBJECT ORIENTED PROGRAMMING

First thing, which I will say about any computer program is that, any program consists of data and the functions operated over data.
Object oriented programming is programming approach where both data and functions (operations) of program  is considered into a single and combine unit.
--------------------------------------------------------- 
Why we combine both Data and Functions
--------------------------------------------------------
The first thing behind this is to provide security to data i.e. data must be accessed by functions of program only and nowhere else.
To achieve this we declare data as private(This is termed as data hiding). 
The second thing is abstraction. Abstraction is the process of hiding how functions are implemented and providing a medium/way to access these functions.

The above two is possible only, if we think a program as bundle of data and operations over data. This program bundle is called an object.

To achieve power of object oriented technique, we should better understand classes and objects. Classes and objects are very basic to understand as beginner in oops.

Concept Class and its Objects-
---------------------------------------

To understand what a class is, lets take an example, suppose a company want to manufacture mobile and also suppose there is no mobile present right now. Company conducts a meeting with their staff members and discuss about Mobile. While discussion the features of  mobiles are told to every one. The properties and behaviors of mobile is  told.