OS...FB - Running Head: OPERATING SYSTEMS 1 Operating...

This preview shows page 1 - 3 out of 6 pages.

Running Head: OPERATING SYSTEMS1Operating SystemsStudent NameInstitutional Affiliation
Operating Systems2…………. (Scenario one)…………Operating SystemsIn computing, it is very important for one to ensure that it is secured from external threatsmainly emanate from the internet. Having this in mind, it is quintessential for one to install aproper security system in place. Installing a firewall is important mainly due to the fact that it is anetwork security system which monitors as well as controls both the outgoing and incomingtraffic mainly based on predetermined security rules (Burnett, 2006). A firewall thereforebasically endeavor’s to establish a form of barrier between a trusted and secure internal networkand another potentially unsecure outside network such as the internet. It is critical to note thatfirewalls are categorized as either host-cased firewalls or network firewalls. Before the initialinstallation of a firewall, one has to disable all the previous firewalls which had been in themachine.The first step is to choose the security settings the firewall automatically tends to blockaccess to ones computer from outside applications, you can thus be able to allow access or evenblock access. The next step is to manually allow programs through firewall. This can beaccomplished by clicking the control panel from the start menu, selecting ‘System and Security’then selecting ‘Windows Firewall’ (Burnett, 2006). You may now click the ‘Allow a program orfeature through Windows Firewall’. The next step is to click ‘Change Settings’ button andselecting a feature or program and clicking okay so as to save the settings. The third step is tocreate a rule so as to enable services. In order to achieve this, you are required to click theadvanced settings, selecting inbound rules which is in the left column and selecting ‘New Rule’which is on the right side of the window and finally selecting the port which is in the new

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
mr
Tags
Computer Security, Password strength, social media tool

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture