Page 201 - PYTHON-12
P. 201

4.  Protocol blocking:  The  firewall  can  be  set  to  disallow  a  particular  protocol  service  to  a
                 particular user or group of users.

              5.  Application Gateway: It applies security mechanisms to specific applications, such as FTP and
                 Telnet servers. This is very effective but can impose performance degradation.

              6.  Circuit-level Gateway:  It  applies  security  mechanisms  when  a  TCP  or  UDP  connection  is
                 established. Once the connection has been made, packets can flow between the hosts without
                 further checking.
              7.  Port blocking: The firewall can be used to block a particular block. Generally, HTTP and FTP
                 services use port80 and port21.
              Firewall protects the user from the following:

              1.  Remote login by others who are not authorized to gain access to the system

              2.  Application backdoors
              3.  SMTP session hijacking
              4.  Email bombs

              5.  Viruses and macros
              6.  Spam or junk mails

               CTM: Firewall is a system that is designed to protect the network from illegal use by an unauthorized
               person.


              8.25 INDIA’S IT ACT


              The Information Technology Act 2000 (also known as ITA-2000 or the IT Act) is an Act of the
              Indian Parliament (No. 21 of 2000) notified on October 17, 2000.
              IT Act 2000 has been defined as:

              “An  Act  to  provide  legal  recognition  for  transactions  carried  out  by  means  of  electronic  data
              interchange and other means of electronic communication, commonly referred to as ’electronic
              commerce‘, which involve the use of alternatives to paper-based methods of communication and
              storage of information, to facilitate electronic filing of documents with the Government agencies
              and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers’ Books
              Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith
              or incidental thereto.”


              8.26 CYBER LAW

              The law that governs the cyber space is known as cyber law. It is the law which deals with various
              computer-related activities. In essence, cyber law is an attempt to apply laws designed for the
              physical world to human activity on the internet. In India, the IT Act, 2000, as amended by the IT
              (Amendment) Act, 2008, is known as the cyber law. It has a separate Chapter XI entitled “Offences”
              in which various cyber crimes have been declared as penal offences punishable with imprisonment
              and fine. A large number of cyber-criminal activities such as hacking passwords or accessing files by
              an unauthorized person or getting private information, etc., have been prevented by implementing    Computer Networks
              cyber laws.

                                                                                                            8.47
   196   197   198   199   200   201   202   203   204   205   206