0% found this document useful (0 votes)
36 views

Carlos CSS10 Q1 LM5

The document provides information about firewalls and network security. It defines what a firewall is and different types of firewalls. It also explains inbound and outbound rules of firewalls and how to access and configure the Windows Firewall with advanced security. The document provides details about network security and the connection security rules of firewalls.

Uploaded by

Van Imperial
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Carlos CSS10 Q1 LM5

The document provides information about firewalls and network security. It defines what a firewall is and different types of firewalls. It also explains inbound and outbound rules of firewalls and how to access and configure the Windows Firewall with advanced security. The document provides details about network security and the connection security rules of firewalls.

Uploaded by

Van Imperial
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Republic of the Philippines

Department of Education
Region V
Schools Division of Sorsogon
BULAN NATIONAL HIGH SCHOOL
Bulan, Sorsogon

TECHNOLOGY AND LIVELIHOOD EDUCATION

mjgsierra

LEARNING MATERIAL FOR COMPUTER SYSTEMS SERVICING (GRADE 10)


I. QUARTER: __1_, Week: 5
II. A. CONTENT STANDARD: The learners demonstrate an understanding of concepts and principles in
setting up computer networks
B. PERFORMANCE STANDARD: The learners shall be able to set up computer networks based
established procedures and system
requirements for hardware
C. LEARNING OUTCOME: LO 2: Set network configuration
D. MOST ESSENTIAL LEARNING COMPETENCY: 2.4 Carry out communication check between
terminals in accordance with operating
systems network configuration guides
CODE: TLE_IACSS9-12SUCN-IVa-j-33
SPECIFIC OBJECTIVES: 1. Identify basic security and firewall
2. Differentiate outbound and inbound rules of firewalls.
3. Access and configure the Windows Firewall with advances security.

III. PRETEST: (Please answer the pre-test before you read the information sheet.)
Choose the correct answer. Write only the letter on the blank provided in learner answer sheet that
can be found in the last
page of this learning material.

1. What is a network security system that monitors and controls the incoming and outgoing network
traffic based on predetermined security rules?
a. Firewall b. Antivirus c. Encryption d. Passkey
2. It is consists of the policies and practices adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources.
a. Firewall b. Inbound rules c. Outbound rules d. Network
Security
3. A firewall that filter traffic between two or more networks; they are either software
appliances running on general purpose hardware, or hardware-based firewall computer appliances.
a. network firewall b. host-based firewall c. firewall with advanced security d. windows
firewall
4. Which rules are applied to the traffic that is coming from the network and the Internet to your
computer or device?
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
5. These used to secure traffic between two computers while it crosses the network.
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules

IV. LEARNING ACTIVITIES:

A. INSTRUCTIONS TO THE LEARNER:


1. Answer the pre-test before you read the information sheet.
2. Read the information sheet.
3. Take note some important points in the information sheet for your future reference.
4. Perform the practice task 1, 2 and 3
5. Perform enrichment/additional activities.
6. Answer the post-test.
7. Use the answer sheet at the last page of this learning material to answer different
tasks/tests.
8. Your teacher will call you on your mobile phone or messenger randomly to assess your
learning. Be prepared at all
times.

B. INFORMATION SHEET:

FIREWALL
A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based
on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network
and another outside network, such as the Internet, that is assumed not to be secure or trusted. Firewalls are often
categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more
networks; they are either software appliances running on general purpose hardware, or hardware-based firewall
computer appliances. Host-based firewalls provide a layer of software on one host that controls network traffic in
and out of that single machine. Firewall appliances may also offer other functionality to the internal network they
protect, such as acting as a DHCP or VPN server for that network.

Figure 1. Firewall illustration

NETWORK SECURITY
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources. Network security involves
the authorization of access to data in a network, which is controlled by the network administrator. Users choose or
are assigned an ID and password or other authenticating information that allows them access to information and
programs within their authority. Network security covers a variety of computer networks, both public and private,
that are used in everyday jobs, conducting transactions and communications among businesses, government agencies
and individuals. Networks can be private, such as within a company, and others which might be open to public
access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title
explains: It secures the network, as well as protecting and overseeing operations being done. The most common and
simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

The Windows Firewall with Advanced Security is a tool which gives you detailed control over the rules that
are applied by the Windows Firewall. You can view all the rules that are used by the Windows Firewall, change their
properties, create new rules or disable existing ones. In this tutorial we will share how to open the Windows Firewall
with Advanced Security, how to find your way around it and talk about the types of rules that are available and what
kind of traffic they filter.
HOW TO ACCESS THE WINDOWS FIREWALL WITH ADVANCED SECURITY?

You have several alternatives to opening the Windows Firewall with Advanced Security:

One is to open the standard Windows


Firewall window, by going to "Control
Panel -> System and Security -> Windows
Firewall". Then, click or tap Advanced
settings.

In Windows 7, another method is to search


for the word firewall in the Start
Menu search box and click the "Windows
Firewall with Advanced Security" result.

In Windows 8.1, Windows Firewall with


Advanced Security is not returned in search results and you need to use the first method shared above for
opening it.

The Windows Firewall with Advanced Security looks and works the same both in Windows 7 and Windows
8.1.

What Are the Inbound & Outbound Rules?

In order to provide the security you need,


the Windows Firewall has a standard set of
inbound and outbound rules, which are
enabled depending on the location of the
network you are connected to.

Inbound rules are applied to the traffic


that is coming from the network and the
Internet to your computer or device.

Outbound rules apply to the traffic from


your computer to the network or the Internet.

These rules can be configured so that they are specific to computers, users, programs, services, ports or
protocols. You can also specify to which type of network adapter (e.g. wireless, cable, virtual private
network) or user profile it is applied to.

In the Windows Firewall with Advanced Security, you can access all rules and edit their properties. All you
have to do is click or tap the appropriate section in the left-side panel.

The rules used by the Windows Firewall can be


enabled or disabled. The ones which are
enabled or active are marked with a green
checkbox in the Name column. The ones that
are disabled are marked with a gray checkbox.
If you want to know more about a specific rule and learn its properties, right click on it and
select Properties or select it and press Properties in the column on right, which lists the actions that are
available for your selection.

In the Properties window, you will find


complete information about the selected rule,
what it does and in when it is applied. You
will also be able to edit its properties and
change any of the available parameters.

What Is the Connection Security Rules?

Connection security rules are used to secure traffic between two computers while it crosses the network.
One example would be a rule which defines that connections between two specific computers must be
encrypted.

Unlike the inbound or outbound rules, which are applied only to one computer, connection security rules
require that both computers have the same rules defined and enabled.

If you want to see if there are


any such rules on your
computer, click or
tap "Connection Security
Rules" on the panel on the left.
By default, there are no such
rules defined on Windows
computers and devices. They
are generally used in business
environments and such rules
are set by the network
administrator.

What Does the Windows Firewall with Advanced Security Monitor?

The Windows Firewall with Advanced Security includes some monitoring features as well. In
the Monitoring section you can find
the following information: the
firewall rules that are active (both
inbound and outbound), the connection security rules that are active and whether there are any active
security associations.

You should note that


the Monitoring section shows only
the active rules for the current
network location.

V. PRACTICE TASK 1. WORDSEARCH. Search the following word either vertically, horizontally, or
diagonally. Use the answer sheet located at the last page of this learning material.

1. FIREWALL
2. INBOUND
3. OUTBOUND
4. SECURITY
5. HOSTBASED

PRACTICE TASK 2. Please write your answer on the blank provided in the Learners Answer Sheet
which is located at the last page of
this learning material.
 Enumerate the different methods of accessing windows firewall with advanced security.
 Write the steps in configuring/ blocking a program from accessing the internet under
outbound rules. (you can search or browse from the internet or youtube)

PRACTICE TASK 3. Please write your answer on the blank provided in the Learners Answer Sheet
which is located at the last page of
this learning material.
 In your own understanding, what is the difference between inbound rules and outbound
rules.?

VI. POST TEST: Choose the correct answer. Write your answer on the answer sheet provided in the last
page of this learning material.
1. Which rules are applied to the traffic that is coming from the network and the Internet to your
computer or device?
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
2. These used to secure traffic between two computers while it crosses the network.
a. Inbound rules b. Outbound rules c. Connection security rules d.
Monitor rules
3. It is consists of the policies and practices adopted to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer network and network-accessible resources.
a. Firewall b. Inbound rules c. Outbound rules d. Network
Security
4. A firewall that filter traffic between two or more networks; they are either software
appliances running on general purpose hardware, or hardware-based firewall computer appliances.
a. network firewall b. host-based firewall c. firewall with advanced security d. windows
firewall
5. What is a network security system that monitors and controls the incoming and outgoing network
traffic based on predetermined security rules?
a. Firewall b. Antivirus c. Encryption d. Passkey

VII. ENRICHMENT/ADDITIONAL ACTIVITIES:

Using any of your available resources (books, modules, Windows 10 computer, etc.) or
youtube video.
1. Enumerate the steps/procedure of accessing firewall of computer with Windows 10 operating
system

VIII. RUBRIC/S

A. PRACTICE TASK 1
Found all five words 5
Found only 4 words 4
Found only 3 words 3
Found only 2 words 2
Found only 1 word 1
No answer/ Found no word/s 0

B. PRACTICE TASK 2
Answers at least 3 methods correctly, 10
Wrote the steps in blocking program using outbound rules correctly.
Answers 3 methods but only two are correct, 8
Wrote the steps in blocking program using outbound rules with
minimal errors
Answers only two correct method 6
Wrote the steps in blocking program using outbound rules
Answers 2 or 3 but only 1 method is correct 4
Without answer in steps in blocking program using outbound rules
Answers only 1 method correctly 2
Without answer in steps in blocking program using outbound rules
No answer 0
C. PRACTICE TASK 3
Correctly differentiated with comprehensive 10
explanation.
Correctly differentiated with minimal explanation 8
Correctly differentiated with minor errors 6
Correctly differentiated but wordings are copied from 4
this module
With answer but incorrectly differentiated 2
No answer 0

D. ENRICHMENT/ADDITIONAL ACTIVITIES RUBRICS

Steps were properly and correctly enumerated 10


Steps were properly enumerated but with minimum 8
error
Steps were enumerated but with 2 – 3 errors. 6
Steps were enumerated but with 4 – 5 errors. 4
Not properly enumerated 2
No answer 0

PREPARED BY: NOTED:

CARLOS M. GRIPON MA. JINKEE G.


SIERRA
TLE-CSS Grade 10 Teacher TLE Department
Coordinator
CP #; Smart/TNT – 09078370500; Globe – 09278684201
Facebook: facebook.com/Carlos Mamenta Gripon

Republic of the Philippines


Department of Education
Region V
Schools Division of Sorsogon
BULAN NATIONAL HIGH SCHOOL
Bulan, Sorsogon

TECHNOLOGY AND LIVELIHOOD EDUCATION


mjgsierra

LEARNER’S ANSWER SHEET


Quarter: 1; Week: 5

NAME OF LEARNER: __________________________________________ DATE:


___________________________
GRADE LEVEL: ____________ SECTION: __________________________

LEARNING MATERIAL FOR __________________________________________

LEARNING OUTCOME (L.O.)


__________________________________________________________________.
(Copy the learning outcome on the space provided)

E. PRETEST
1. ________
2. ________
3. ________
4. ________
5. ________

PRACTICE TASK 1. WORDSEARCH. Search the following word either vertically, horizontally, or diagonally.
Use the answer sheet located at the last page of this learning material.

1. FIREWALL
2. INBOUND
3. OUTBOUND
4. SECURITY
5. HOSTBASED

F. PRACTICE TASK 2

_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_________________________________________________________________________________.

G. PRACTICE TASK 3

_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
___________________________________________________________________________

H. POST TEST:

1. _____
2. _____
3. _____
4. _____
5. _____

ENRICHMENT/ADDITIONAL ACTIVITIES:

______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
______________________________________________________________________________________________
__________________________________

________________________________________________
(Parent’s Signature Over Printed Name)

SCORE/RATING: (For Teacher)

PRETEST PRACTICE PRACTICE PRACTICE ENRICHM POST TEST


TASK 1 TASK 2 TASK 3 ENT

You might also like