Page 201 - PYTHON-12
P. 201
4. Protocol blocking: The firewall can be set to disallow a particular protocol service to a
particular user or group of users.
5. Application Gateway: It applies security mechanisms to specific applications, such as FTP and
Telnet servers. This is very effective but can impose performance degradation.
6. Circuit-level Gateway: It applies security mechanisms when a TCP or UDP connection is
established. Once the connection has been made, packets can flow between the hosts without
further checking.
7. Port blocking: The firewall can be used to block a particular block. Generally, HTTP and FTP
services use port80 and port21.
Firewall protects the user from the following:
1. Remote login by others who are not authorized to gain access to the system
2. Application backdoors
3. SMTP session hijacking
4. Email bombs
5. Viruses and macros
6. Spam or junk mails
CTM: Firewall is a system that is designed to protect the network from illegal use by an unauthorized
person.
8.25 INDIA’S IT ACT
The Information Technology Act 2000 (also known as ITA-2000 or the IT Act) is an Act of the
Indian Parliament (No. 21 of 2000) notified on October 17, 2000.
IT Act 2000 has been defined as:
“An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as ’electronic
commerce‘, which involve the use of alternatives to paper-based methods of communication and
storage of information, to facilitate electronic filing of documents with the Government agencies
and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers’ Books
Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith
or incidental thereto.”
8.26 CYBER LAW
The law that governs the cyber space is known as cyber law. It is the law which deals with various
computer-related activities. In essence, cyber law is an attempt to apply laws designed for the
physical world to human activity on the internet. In India, the IT Act, 2000, as amended by the IT
(Amendment) Act, 2008, is known as the cyber law. It has a separate Chapter XI entitled “Offences”
in which various cyber crimes have been declared as penal offences punishable with imprisonment
and fine. A large number of cyber-criminal activities such as hacking passwords or accessing files by
an unauthorized person or getting private information, etc., have been prevented by implementing Computer Networks
cyber laws.
8.47