CSS - 05-Week 14 - Module 14 - Security Firewall and VPN
CSS - 05-Week 14 - Module 14 - Security Firewall and VPN
CSS - 05-Week 14 - Module 14 - Security Firewall and VPN
MODULE FOR
CSS_05: SETUP COMPUTER NETWORKS
ACTIVITY:
Answer the following questions on a sheet of paper:
PRE-TEST
1. What is a Security Firewall?
2. What is a VPN?
I. DISCUSSION:
Introduction
Through this module you will get an understanding of how
important a firewall and security settings on computer especially for those
connected through a network. Its purpose and how we could protect the
data and information stored in our computer unit.
What is a Firewall?
A firewall is a network security system designed to prevent
unauthorized access to or from a private network. Firewalls can be
implemented in both hardware and software, or a combination of both. A
firewall is software or hardware that checks information coming from the
Internet or a network, and then either blocks it or allows it to pass through
to your computer, depending on your firewall settings.
2. On the Control Panel search and click for System and Security feature.
4. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection
when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more
difficult for third parties to track your activities online and steal data. The encryption takes place in real time.
A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a
VPN host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means
your Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send
and receive online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their
hands on your data, it would be useless.
A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data can be
viewed by anyone who has network access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher
this data.
Secure encryption: To read the data, you need an encryption key. Without one, it would take millions of years for a
computer to decipher the code in the event of a brute force attack . With the help of a VPN, your online activities are
hidden even on public networks.
Disguising your whereabouts: VPN servers essentially act as your proxies on the internet. Because the demographic
location data comes from a server in another country, your actual location cannot be determined. In addition, most
VPN services do not store logs of your activities. Some providers, on the other hand, record your behavior, but do not
pass this information on to third parties. This means that any potential record of your user behavior remains
permanently hidden.
Access to regional content: Regional web content is not always accessible from everywhere. Services and websites
often contain content that can only be accessed from certain parts of the world. Standard connections use local servers
in the country to determine your location. This means that you cannot access content at home while traveling, and you
cannot access international content from home. With VPN location spoofing, you can switch to a server to another
country and effectively “change” your location.
Secure data transfer: If you work remotely, you may need to access important files on your company’s network. For
security reasons, this kind of information requires a secure connection. To gain access to the network, a VPN
connection is often required. VPN services connect to private servers and use encryption methods to reduce the risk
of data leakage.
Note: For further study watch the following videos on YouTube. The link is provided below.
Electronic references:
https://www.kaspersky.com/resource-center/definitions/what-is-a-vpn
https://www.youtube.com/watch?v=_wQTRMBAvzg
https://www.youtube.com/watch?v=kDEX1HXybrU&t=119s
II. PRACTICE/APPLICATION:
III. ASSESSMENT:
IV. REFLECTION:
Prepared by:
Prepared by: