The Comodo Firewall Explained

The Name of the Firewall


The name of the firewall installed on the personal workstation is Comodo version 10.1.0.6476. The firewall is capable of providing virtual internet browsing and is able to block ads. Besides, Comodo firewall can act as a Domain Name System (DNS) server which can be customized (Borgolte et al., 2018). The firewall also offers a Game Mode as a feature. The Virtual Kiosk feature gives the use and opportunity to allow programs or processes from getting in or out of a particular network. The Comodo firewall has switch buttons which are used to activate certain features of security. The firewall has a scan, update, virtual kiosk, view quarantine, and task manager switch buttons (Hassan " Hijazi, 2017). The scan button initiates a process that checks for malware and suspicious programs/processes in the workstation. The scan can be customized to check certain sections of the workstation or can be a full scan which checks all programs/processes in use. The update button incorporates new descriptions of malware and suspicious programs to the Comodo firewall to ensure it is up to date. Quarantine gives the user an opportunity to decide what happens to the programs/processes which have been flagged. Through a Rating Scan option, the Comodo firewall is able to show which processes can be trusted and the level of trust. Rating helps in identifying a process that disguises as harmless yet it is malware.


Threat Mitigation


Comodo firewall mitigates various threats that may emanate from the internet or another workstation via the network. Comodo removes spyware, malware, viruses, malicious software, and unauthorized database updates. Also, the firewall prevents attackers from retrieving information remotely in a workstation (Oppitz " Tomsu, 2018). Besides, it controls suspicious and untrusted programs by placing them in a sandbox and limiting their capability.

References


Borgolte, K., Fiebig, T., Hao, S., Kruegel, C., " Vigna, G. (2018). Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. In Proc. Internet Society Symposium on Network and Distributed System Security (NDSS).


Hassan, N. A., " Hijazi, R. (2017). Essential Privacy Tips. In Digital Privacy and Security Using Windows (pp. 33-102). Apress, Berkeley, CA.


Oppitz, M., " Tomsu, P. (2018). Security and Privacy Challenges. In Inventing the Cloud Century (pp. 377-410). Springer, Cham.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price