The Name of the Firewall
The name of the firewall installed on the personal workstation is Comodo version 10.1.0.6476. The firewall is capable of providing virtual internet browsing and is able to block ads. Besides, Comodo firewall can act as a Domain Name System (DNS) server which can be customized (Borgolte et al., 2018). The firewall also offers a Game Mode as a feature. The Virtual Kiosk feature gives the use and opportunity to allow programs or processes from getting in or out of a particular network. The Comodo firewall has switch buttons which are used to activate certain features of security. The firewall has a scan, update, virtual kiosk, view quarantine, and task manager switch buttons (Hassan " Hijazi, 2017). The scan button initiates a process that checks for malware and suspicious programs/processes in the workstation. The scan can be customized to check certain sections of the workstation or can be a full scan which checks all programs/processes in use. The update button incorporates new descriptions of malware and suspicious programs to the Comodo firewall to ensure it is up to date. Quarantine gives the user an opportunity to decide what happens to the programs/processes which have been flagged. Through a Rating Scan option, the Comodo firewall is able to show which processes can be trusted and the level of trust. Rating helps in identifying a process that disguises as harmless yet it is malware.
Threat Mitigation
Comodo firewall mitigates various threats that may emanate from the internet or another workstation via the network. Comodo removes spyware, malware, viruses, malicious software, and unauthorized database updates. Also, the firewall prevents attackers from retrieving information remotely in a workstation (Oppitz " Tomsu, 2018). Besides, it controls suspicious and untrusted programs by placing them in a sandbox and limiting their capability.
References
Borgolte, K., Fiebig, T., Hao, S., Kruegel, C., " Vigna, G. (2018). Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. In Proc. Internet Society Symposium on Network and Distributed System Security (NDSS).
Hassan, N. A., " Hijazi, R. (2017). Essential Privacy Tips. In Digital Privacy and Security Using Windows (pp. 33-102). Apress, Berkeley, CA.
Oppitz, M., " Tomsu, P. (2018). Security and Privacy Challenges. In Inventing the Cloud Century (pp. 377-410). Springer, Cham.