Tuesday, December 23, 2008

Firewalls and Token IDs

Firewalls - Virus Protection
A firewall is a device or set of devices at carriers, enterprises, and homes that screens incoming and internal traffic to prevent hackers' access to files. Firewalls are designed to keep out hackers by allowing only designated users to access networks. In organizations' networks, firewall software is installed on routers and on remote access switches called VPN gateways. Organizations that use carriers' firewall protection have onsite firewall protection as well.
Firewalls use various techniques including address filtering, which looks at a user's IP address and accepts or rejects messages based on the IP address. Important applications might contain their own firewalls for extra protection. Firewalls can also restrict communications to certain addresses. New firewalls can also filter by port. In addition, they can be programmed to recognize applications and content. Acting as an agent for and screening traffic for applications is referred to intermediation or proxy-type functions.

Because employees use their laptops at home to surf the Web and then bring them into work, corporations monitor internal transmissions as well as communications from the Internet. The goal is to avoid contamination from these laptops.

Firewalls do not protect against viruses and other threats. Corporations often subscribe to security services that keep them posted about new software attacks, monitor their networks for unusual amounts or types of traffic, and download protection against new types of attacks.

Token ID Security - Identify Verification
Token identification, which adds an additional layer of user authentication in addition to passwords, is used in most remote access services. Tokens are small devices that generate new six- to eight-digit numbers every 60 seconds. When prompted, users type in the token-generated number. These numbers are generated by a combination of factory set matching numbers in the user's device and a central server combined with the time. To be authenticated, the number the user types in must match that generated by the central computer. RSA is the leading supplier of token IDs. If a person's password is stolen, the hacker will not be able to access the network unless he or she has the token as well as the password.

No comments: