Professional Documents
Culture Documents
Ict CSS SHS12 Q2 Las5 Final
Ict CSS SHS12 Q2 Las5 Final
i|Page
Activity Sheet No. 5
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Introductory Message
ii | P a g e
Welcome to TVL 12- ICT (Computer System Servicing)!
The Computer System Servicing NC II Activity Sheet will help you facilitate
the leaching-learning activities specified in each Most Essential Learning
Competency (MELC) with minimal or no face-to-face encounter between you and
learner. This will be made available to the learners with the references/links to ease
the independent learning.
iii | P a g e
iv | P a g e
Quarter 2, Week 5
Name of Learner:________________________________________________________
Grade and Section:___________________________________ Date: ______________
1|Page
FIREWALL
A firewall is a security device —
computer hardw are or software —
that can help protect your network
by filtering traffic and blocking
outsiders from gaining
unauthorized access to the private
data on your computer.
Not only does a firewall block
unwanted traffic, it can also help
block malicious software from
infecting your computer. https://www.hotspotshield.com/imgs/learn/what-is-
a-computer-firewall/pic.jpg
Firewalls can provide different
levels of protection. They key is determining how much protection you need.
2|Page
HOW DOES A FIREWALL WORK?
To start, a firewalled system analyzes network traffic based on rules. A firewall only
welcomes those incoming connections that it has been configured to accept. It does
this by allowing or blocking specific data packets — units of communication you
send over digital networks — based on pre-established security rules.
A firewall works like a traffic guard at your computer’s entry point, or port. Only
trusted sources, or IP addresses, are allowed in. IP addresses are important
because they identify a computer or source, just like your postal address identifies
where you live.
TYPES OF FIREWALLS
There are software and hardware firewalls. Each format serves a different but
important purpose. A hardware firewall is physical, like a broadband router —
stored between your network and gateway. A software firewall is internal — a
program on your computer that works through port numbers and applications.
There also are cloud-based firewalls, known as Firewall as a Service (FaaS). One
benefit of cloud-based firewalls is that they can grow with your organization and,
similar to hardware firewalls, do well with perimeter security.
There are several different types of firewalls based on their structure and
functionality. Here are the different firewalls you can implement, depending on the
size of your network and the level of security you need.
Packet-filtering firewalls
A packet-filtering firewall is a management program that can block network
traffic IP protocol, an IP address, and a port number. This type of firewall is the
most basic form of protection and is meant for smaller networks.
While packet-filtering firewalls can be helpful, they also have limitations.
Because all web traffic is allowed, it doesn’t block web-based attacks. So, you
need additional protection to distinguish between friendly and malicious web
traffic.
3|Page
However, it is still unable to distinguish between good and bad web traffic, so
you may need additional software.
4|Page
Here are the three main risks of not having a firewall:
Open access
Without a firewall, you’re accepting every connection into your network from
anyone. You wouldn’t have any way to detect incoming threats that could leave
your devices vulnerable to malicious users.
Network crashes
Without a firewall, attackers could shut down your network. Getting it running
again, and attempting to recover your stored data, could involve your time and
money.
Firewalls are a key part of security technology, especially when the different
types of firewalls work together to provide an umbrella of protection. Firewalls
can help keep your network, computer, and data safe and secure.
5|Page
Stateful packet inspection – This is a firewall that keeps track of the
state of network connections traveling through the firewall. Packets that
are not part of a known connection are dropped.
Hardware Firewall
A hardware firewall is a physical filtering component that inspects data packets
from the network before they reach computers and other devices on a network. A
hardware firewall is a free-standing unit that does not use the resources of the
computers it is protecting, so there is no impact on processing performance.
Software Firewall
A software firewall is an application on a computer that inspects and filters data
packets. Windows Firewall is an example of a software firewall that is included in
the Windows operating system. A software firewall uses the resources of the
computer, resulting in reduced performance for the user.
Software Firewalls
Software firewalls can be either an independent application or part of the
operating system. There are several third-party software firewalls. There is also
a software firewall built into Windows 10.
6|Page
Windows Defender Firewall
Standard Procedure:
1. Select the Start button > Settings > Update & Security > Windows
Security and then Firewall & network protection. Open Windows Security
settings
2. Select a network profile.
3. Under Microsoft Defender Firewall, switch the setting to On. If your device is
connected to a network, network policy settings might prevent you from
completing these steps. For more info, contact your administrator.
4. To turn it off, switch the setting to Off. Turning off Windows Defender Firewall
could make your device (and network, if you have one) more vulnerable to
unauthorized access. If there's an app you need to use that's being blocked, you
can allow it through the firewall, instead of turning the firewall off.
Short Cut:
Windows key + R,
type WF.msc, and
then press ENTER.
7|Page
Windows Defender Firewall
8|Page
Server). Outbound refers to connections going-out to a specific device from a
device/host.
Use
the Browse b
utton to
specify the
path to the
executable file
that you want
to allow
access to the
9|Page
Internet. We selected our browser’s executable file C:\Program Files\Mozilla Firefox\
firefox.exe
Click OK and select for which network profiles this rule should be active.
You can configure Windows Defender Firewall rules more finely from the
wf.msc console. Here you can create separate allowing or blocking rules
for a specific program, protocol (TCP/UDP/ ICMP/IPsec), IP address or port
number.
10 | P a g e
Next, follow a simple wizard to help you to create your own rule in Windows Defender
Firewall.
Select Allow the
connection and provide a
name for the rule.
11 | P a g e
The
new rule
will
appear
in
the Out
bound
rules lis
t. You
can
disable
it via
the Disa
ble
rule opti
on in
context menu. This does not delete the rule, but it becomes inactive.
For more readings about Windows Defender Firewall you may open this link.
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/
best-practices-configuring
12 | P a g e
III. Accompanying DepEd Textbook and Educational Sites (With Possible
Materials for experiments/activities)
https://www.kaspersky.com/resource-center/definitions/firewall, Retrieved on
November 4, 2020, 8:05 AM
https://us.norton.com/internetsecurity-emerging-threats-what-is-firewall.html,
Retrieved on November 4, 2020, 8:15 AM
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-
firewall/best-practices-configuring, Retrieved on November 4, 2020, 8:26 AM
CISCO IT Essentials Offline Materials, Retrieved on November 4, 2020, 9:15 AM
2. Exercises / Activities
2.1 Multiple Choice. Encircle the correct answer from the given choices below.
1. These are the common threats when linking your computer to a network or the
internet, except.
a. Hacking c. identity theft
b. cloud storage d. online fraud
2. The most basic form of protection and is meant for smaller networks.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
d. Network address translation (NAT) firewalls
4. This involves using data from prior connections and packets from the same
connection.
a. Stateful multi-layer inspection (SMLI) firewalls
b. Packet-filtering firewalls
c. Next-generation firewalls (NGFW)
13 | P a g e
d. Network address translation (NAT) firewalls
5. The risk that attackers could shut down your network if without a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None
6. The risk that you’re accepting every connection into your network from
anyone if without a firewall.
a. Open access c. Network crashes
b. Lost or compromised data d. None
7. This is a firewall that keeps track of the state of network connections traveling
through the firewall.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None
8. This is a set of rules that allows or denies traffic based on criteria such as IP
addresses, protocols, or ports used.
a. Stateful packet inspection c. Packet Filter
b. Proxy Firewall d. None
Scoring Rubric
14 | P a g e
learning.
More specific
information is
needed or
question. Overall, a decent job. learned. Well done!
you need to
follow the
directions
more closely.
Only one term
Your answer included all
from the
the terms from the lesson
Use of lesson is Your answer included several
No terms from that applied to the
terms used in the terms from the lesson,
the lesson are question asked. All terms
answer. Try demonstrating adequate
used. are fully defined and
for a few understanding of the material.
used in the proper
more, next
context.
time.
Some
sentences are
Sentenc Sentences are Sentences are complete
complete and
e incomplete or and they connect to one
easy to Sentences are complete and
Fluency too long. It another easily when they
understand. able to be understood.
makes reading are read out loud. Your
Others
them difficult. writing 'flows.'
require some
work.
Few end Mistakes Use of punctuation marks and No punctuation or
marks or using end capitals, as well as spelling, is structural mistakes. No
capital letters. marks or mostly correct. Few errors spelling errors. Your
Conventi Answers capitals as exist in your answer. writing shows full
ons contain well as awareness of the rules of
numerous spelling English use.
spelling or mistakes
structural make the
errors. writing hard to
read.
V. Reflection
Facebook is one of the most popular social media platforms in the world.
Although it has various benefits and is one of the most powerful creations, it
also contains many disadvantages. Some of them are addiction, time-waster,
and causes distractions. Person can lead to spending his precious time on
Facebook, rather than doing something productive. For children to become
productive, parents must do something to limit the usage of these platform at
home.
How to limit the usage of social media platform like Facebook? Discuss.
15 | P a g e
VI. Answer Key
Multiple Choice
1. B
2. B
3. C
4. A
5. C
6. A
7. A
8. C
9. B
10. D
16 | P a g e