Sie sind auf Seite 1von 2

SERVICIO NACIONAL DE APRENDIZAJE - SENA Versión: 01

REGIONAL TOLIMA
CENTRO DE LA INDUSTRIA Y LA CONSTRUCCIÓN
Fecha: 6/03/2020
COMPETENCIA: PRODUCIR TEXTOS EN INGLES EN FORMA ESCRITA Y ORAL

PROGRAMA DE FORMACIÓN: MECDICE


CODIGO DE LA FICHA: 1828570 FECHA: March 24/ 2020
NOMBRES Y APELLIDOS NÚMERO DE DOCUMENTO
SERGIO SAMUEL PARRA CALDERÓN
LAURA GISELL SUAREZ FLOREZ
BRAYAN ESTIVER NUÑEZ GUZMAN
JOHN STIVEN ALZATE TAVERA

Technical Reading: MECDICE Firewalls In Network Security.

Main Idea:

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow
or block specific traffic based on a defined set of security rules by establishing a barrier to dangerous content.

Secondary Ideas:

 In the first three layers of the OSI model, firewall packet filtering works to check the source, the destination,
protocol and destination port number of each incoming or outgoing information packet.

 Application layer firewalls protect servers as applications, using this method packets can be filtered at any OSI
layer and allow blocking specific content such as malware or certain websites.

 A proxy firewall serves as a gateway from one network to another for a specific application, using a forced
session for data traffic to flow

Technical Vocabulary:

1. Firewall: A firewall is the part of a computer system or computer network that is designed to block unauthorized
access, while allowing authorized communications.

2. Packet filter: Allows you to create a set of rules that drop or accept the traffic that crosses a network connection.

3. OSI model: It is a reference model for network protocols, created in 1980 by the International Organization for
Standardization.

4. Stateful Inspection: Allow or block traffic based on status, port, and protocol. Monitors all activity from the
opening of a connection until it is closed. Filtering decisions are made based on both the rules defined by the
administrator and the context.

5. HTTP Protocol: The Hypertext Transfer Protocol is the communication protocol that allows information transfers
on the World Wide Web.

6. FTP Protocol: The File Transfer Protocol is a network protocol for transferring files between systems connected
to a TCP network, based on the client-server architecture.

7. DNS Protocol: The domain name system is a decentralized hierarchical naming system for devices connected
to IP networks such as the Internet or a private network. This system associates various information with the
domain name assigned to each of the participants.
SERVICIO NACIONAL DE APRENDIZAJE - SENA Versión: 01
REGIONAL TOLIMA
CENTRO DE LA INDUSTRIA Y LA CONSTRUCCIÓN
Fecha: 6/03/2020
COMPETENCIA: PRODUCIR TEXTOS EN INGLES EN FORMA ESCRITA Y ORAL

8. Proxy: A proxy, or proxy server, in a computer network, is a server —program or device—, which acts as an
intermediary in requests for resources made by a client to another server.

9. Server: A server is a type of software that performs certain tasks on behalf of users. It is also the physical
computer on which that software works, a machine whose purpose is to provide data so that other machines can
use that data.

10. Application: An application is a computer program designed as a tool to allow a user to carry out one or several
types of tasks.

Summary:

Today, we are in a digital age where it is difficult to navigate the Internet without protection. That is why a firewall is used,
whose function is to control data traffic, verifying the reliable and unreliable content of the network. Although this software
has had vulnerabilities to various computer attacks, tools have been implemented that strengthen its functionality and
allow users to rest easy while working on the computer.

Passive Voice Sentences:

1. Firewalls are used to protect networks and prevent attacks from unauthorized persons.

2. Application filtering appeared in 1999, to protect servers and applications from computer attacks.

3. Voice and data networks are established and maintained by network managers.

4. Firewalls are used and provided by MSPs.

5. Network threats are discovered and neutralized by a leading provider of IT services.

6. Safe and relevant data is allowed by a firewall on a network.

7. The origin, destination, protocol and destination port number of packets are checked by firewalls.

8. Existing connection packets are immediately dropped by firewalls while evaluating others.

9. Direct connections are bypassed and blocked by proxy firewalls.

10. Computers with weak firewalls are attacked by unauthorized persons.

OBSERVACIONES: __________________________________________________________________________________________________

JUICIO EVALUATIVO FINAL: APROBADO_____ NO APROBADO______

__________________________________
NOMBRE Y FIRMA DEL INSTRUCTOR

Das könnte Ihnen auch gefallen