CSS - 05-Week 14 - Module 14 - Security Firewall and VPN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Achieve Great Things, Initiate Changes, Transform from Better to best, Excel and Remain Humble

Main:Gret-Fisico Bldg., Maharlika Highway, Brgy. Lumingon, Tiaong, Quezon, Philippines


Annex: OLINSTERG Bldg., Maharlika Highway, Brgy. Poblacion III, Tiaong, Quezon, Philippines
Telefax Number: (042)-545-6547 / Cell No. 0922-8934738

MODULE FOR
CSS_05: SETUP COMPUTER NETWORKS

1. QUARTER NO. & TITLE: QUARTER 3: SETUP COMPUTER NETWORKS


LESSON NO. & TITLE: Lesson 14: Security Firewall Settings and VPN

I. WEEK NUMBER: Week 14


II. MODULE NUMBER: Module 14
III. OBJECTIVES: At the end of the lesson, students must be able to:
1. Define Security Firewall and VPN
2. Setup a security firewall
3. Setup VPN

ACTIVITY:
Answer the following questions on a sheet of paper:
PRE-TEST
1. What is a Security Firewall?

2. What is a VPN?

I. DISCUSSION:
Introduction
Through this module you will get an understanding of how
important a firewall and security settings on computer especially for those
connected through a network. Its purpose and how we could protect the
data and information stored in our computer unit.

What is a Firewall?
A firewall is a network security system designed to prevent
unauthorized access to or from a private network. Firewalls can be
implemented in both hardware and software, or a combination of both. A
firewall is software or hardware that checks information coming from the
Internet or a network, and then either blocks it or allows it to pass through
to your computer, depending on your firewall settings.

It also helps prevent hackers or malicious software (such as worms)


from gaining access to your computer through a network or the Internet.
A firewall can also help stop your computer from sending malicious
software to other computers.
An illustration shows how a firewall works

Just as a brick wall can create a physical barrier, a firewall creates


a barrier between the Internet and your computer. A firewall isn't the same
thing as an antivirus program. To help protect your computer, you need
both a firewall and an antivirus and anti-malware program.
How to set up Firewall?

1. Open Windows Firewall by clicking the Start button , and then


clicking Control Panel.

2. On the Control Panel search and click for System and Security feature.

3. In the left pane, click Turn Windows Firewall on or off. If you're


prompted for an administrator password or confirmation, type the
password or provide confirmation.

4. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.

Turn on Firewall Turn off Firewall


What is VPN? How It Works, Types of VPN

VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection
when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more
difficult for third parties to track your activities online and steal data. The encryption takes place in real time.

How does a VPN work?

A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a
VPN host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means
your Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send
and receive online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their
hands on your data, it would be useless.

What are the benefits of a VPN connection?

A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data can be
viewed by anyone who has network access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher
this data.

Secure encryption: To read the data, you need an encryption key. Without one, it would take millions of years for a
computer to decipher the code in the event of a brute force attack . With the help of a VPN, your online activities are
hidden even on public networks.

Disguising your whereabouts: VPN servers essentially act as your proxies on the internet. Because the demographic
location data comes from a server in another country, your actual location cannot be determined. In addition, most
VPN services do not store logs of your activities. Some providers, on the other hand, record your behavior, but do not
pass this information on to third parties. This means that any potential record of your user behavior remains
permanently hidden.

Access to regional content: Regional web content is not always accessible from everywhere. Services and websites
often contain content that can only be accessed from certain parts of the world. Standard connections use local servers
in the country to determine your location. This means that you cannot access content at home while traveling, and you
cannot access international content from home. With VPN location spoofing, you can switch to a server to another
country and effectively “change” your location.

Secure data transfer: If you work remotely, you may need to access important files on your company’s network. For
security reasons, this kind of information requires a secure connection. To gain access to the network, a VPN
connection is often required. VPN services connect to private servers and use encryption methods to reduce the risk
of data leakage.

Note: For further study watch the following videos on YouTube. The link is provided below.

Here are the links:


What is a Firewall? Uploaded by PowerCert Animated Videos
https://www.youtube.com/watch?v=kDEX1HXybrU&t=119s

What is a VPN and How Does it Work? Uploaded by vpnMentor


https://www.youtube.com/watch?v=_wQTRMBAvzg

Electronic references:
https://www.kaspersky.com/resource-center/definitions/what-is-a-vpn
https://www.youtube.com/watch?v=_wQTRMBAvzg
https://www.youtube.com/watch?v=kDEX1HXybrU&t=119s
II. PRACTICE/APPLICATION:

Search at least 3 VPN company provider.

III. ASSESSMENT:

Answer Self-Check No. 14

IV. REFLECTION:

Explain the importance of using Firewall and VPN?

V. FEEDBACK: (Teacher’s comments or reactions after submission and checking.)

Prepared by:

NILO P. BRIONES, LPT


Subject Teacher

Checked and Noted By:

LAARNI L. TOLENTINO, LPT


Principal
Achieve Great Things, Initiate Changes, Transform from Better to best, Excel and Remain Humble

Main:Gret-Fisico Bldg., Maharlika Highway, Brgy. Lumingon, Tiaong, Quezon, Philippines


Annex: OLINSTERG Bldg., Maharlika Highway, Brgy. Poblacion III, Tiaong, Quezon, Philippines
Telefax Number: (042)-545-6547 / Cell No. 0922-8934738

CSS_05: SETUP COMPUTER NETWORKS


SEFL-CHECK NO. 14
Lesson: Security Firewall Settings and VPN

Directions: Choose the correct answer for the following items


below. Write the letter on the space provided for each item.

_______1. It is a network security system designed to prevent


unauthorized access to or from a private network.
A. Malware
B. Denial of Service
C. Hacking
D. Firewall

_______2. System and security feature of a Microsoft Windows operating


system can be found at.
A. My Computer B. Control Panel C. Windows32 D. cmd

_______3. On what icon can we see the control panel menu.


A. Task bar B. Power on button C. Start button D. Esc

_______4. An Anti-virus or simple called as AV is software that protects


the computer against malicious software came from untrusted websites.
What is a best example of an anti-virus software?
A. Winrar B. Kaspersky C. CC Cleaner D. Torrent

_______5. A firewall is software or hardware that checks information


coming from the Internet or a network, and then either blocks it or
allows it to pass through to your computer, depending on your firewall
settings. It should be always turned?
A. On
B. Off
C. Neither On or Off
D. Not configured

Prepared by:

NILO P. BRIONES, LPT


Subject Teacher

Checked and Noted By:

LAARNI L. TOLENTINO, LPT


Principal

You might also like