Navigate Up
Sign In

Topic 8: Best Practices With Firewalls


Firewall movie still

To watch the video, click on the icon below that matches your media player. If you don't have a player, go to our download page. If you need a video with text captions, please visit our text-captioned page.

flash player icon
quicktime player icon
windows media player icon

Before hackers can do things to your computer, they need to gain information about your system and the network where it resides. This information gathering process is called reconnaissance.

A good way to protect yourself from hackers and their reconnaissance is to use a personal firewall. A personal firewall is a device or software package that can actively monitor Internet traffic to and from your computer, provide detailed logs of hacking attempts against your computer, and can be configured to block traffic that you don't want to receive. Firewalls can significantly hinder a hacker's ability to acquire information about your computer and subsequently hinder their ability to wreak their havoc.

Examples of a few things firewalls can do:

   Block ports that viruses, worms, and Trojans use to communicate with other machines on the Internet.

   Prevent unwanted sharing of your files and computer resources such as printers.

   Prevent applications on your computer from connecting to the Internet if they don't need to.

   Block illegitimate traffic sent by your computer or illegitimate traffic sent to your computer.

   Significantly increase the difficulty for hackers to access and subsequently exploit un-patched network      applications and services on your computer.

Traffic sent to and from your computer often travels "in the clear". This means that malicious persons can intercept communication with your computer and read and/or alter the content of the communication. Examples of information that would be of interest to a malicious person are passwords, credit card numbers, and other personal information. VPNs (Virtual Private Networks) offer a method for computer users to encrypt, or make unreadable, any personal information that might be intercepted. The computer user is required to install a VPN software client in order to utilize a VPN. Once the VPN client software is installed and started, an encrypted channel can be established between your computer and the VPN concentrator thus thwarting attempts to intercept personal information.

Interested in Exploring More?

Here are some sites you can use to look for more information:
Firewall FAQ
Why Should I Use A Firewall?
What Windows Firewall Does and Does Not Do
Safe and Sound Mac OS X
Apple Mac Advance Network Options VPN and Firewall
Home PC Firewall guide
How Firewalls Work
Internet Firewalls: Frequently Asked Questions
Virtual Private Networks
Virtual Private Network (VPN)
Connecting to a Virtual Private Network in OS X


IT Security Awareness Training Topics
Virus Protection
Passwords
Storing Sensitive Data
Spyware
Email Hoaxes

Virus Protection

Passwords

Storing Sensitive Data

Spyware

Email Hoaxes


Desktop Security
Phishing
Firewalls
File Sharing
 

Desktop Security

Phishing

Firewalls

File Sharing and Copyright

 

If you need any assistance, email aware@itc.utk.edu for help.

Click here to go back to the main Security Awareness Training page.