Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Ernesto E. Dela Cruz Jr.

BSIT 3 BLOCK 1

Information Assurance and Security


ACTIVITY FOR PRELIM PERIOD
INSTRUCTIONS:
1. Configure windows firewall. (Both public and private.) Take a screenshot of your firewall.

2. After configuring windows firewall, configure exceptions.


3. Add the windows media center program in private network. (Take a screen shot)
Ernesto E. Dela Cruz Jr. BSIT 3 BLOCK 1

4. Answer the following question while doing your activity:


a. What are the connection security rules?
Network connections may be made secure and private by following a set of rules and protocols
known as connection security rules. Following are some general guidelines for connection
security:
• Employ encryption: One of the most crucial security procedures is to encrypt data being
transported via networks. Even if a hacker intercepts the data, encryption assures that they
won't be able to read it.
• Use secure passwords: It's crucial to use secure passwords for network logins and other
security systems. Strong passwords should contain a mix of upper- and lowercase letters,
digits, and special characters, and should be at least 8 to 12 characters long.
• Employ two-factor authentication to increase security by requiring a user to provide two
distinct authentication factors (such as a password and a verification code delivered to their
phone) in order to access a system.
• Restrict access: One other crucial security step is to restrict access to network resources to
just those who require it. Role-based access restrictions can be implemented for this, or
access can be controlled through firewalls.
Ernesto E. Dela Cruz Jr. BSIT 3 BLOCK 1

• Maintain software updates: It's critical to maintain software updates so that security
vulnerabilities may be fixed. This covers everything from network hardware to security
systems, in addition to operating systems and applications.
• Monitoring network traffic may assist in spotting any unusual behavior, such as illegal
logins or data transfers, and enabling quick remediation before it results in a security
breach.
Organizations may help safeguard their networks and sensitive data from cyber attacks by adhering
to these and other security best practices.
b. What does the Windows Firewall with advanced security monitor?
On a Windows machine, the sophisticated security Windows Firewall keeps track of all
incoming and outgoing network traffic. By filtering network traffic according to pre-established
criteria, it adds an extra layer of security against illegal access to or from the computer.
You may define and manage inbound and outgoing traffic rules for individual applications,
services, and ports using the Windows Firewall's sophisticated security capabilities. On the basis
of the source or destination IP address, protocol, or port, you may also construct your own rules to
allow or prohibit particular types of communication.
The Windows Firewall may keep an eye on a variety of activities, including:
• Traffic entering and exiting from various network interfaces
• Traffic from particular services or apps
• Based on certain parameters like an IP address, a port number, or a protocol type, traffic
• Security incidents connected to firewall behavior, such lost packets, established
connections, or traffic blocks.
Overall, the Windows Firewall with enhanced security adds a crucial layer of security to Windows
machines by keeping an eye on and managing network traffic to help stop data loss and unwanted
access.
PICTURES:
Ernesto E. Dela Cruz Jr. BSIT 3 BLOCK 1

You might also like