Subject: Information Security
1. Topic-
Firewall- Introduction, Needs, Characteristics and Limitations of Firewall
 
2. Content-
This session will be started with the brief introduction of Information Security and some important terms relevant to it. Then they will learn about Firewall, Needs, Characteristics and Limitations of Firewall. While learning they will be engaged in interesting activities, discussions and games.
BRIEF ABOUT TOPICS
A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. Acting as a barrier between a trusted network and other untrusted networks, such as the Internet or less-trusted networks. A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network defined in the firewall policy is, all other traffic is denied. Thus it protects (an internal network or system) from unauthorized access.

 
3. Goals: Aims/Outcomes-
1.Be familiarized with the term Information Security and its requirement.
2.Be aware with the possible threats to the Information security.
3.Understand the requirements, characteristics and limitations of firewall in networks.
4.Understand how the network traffic passes inside and outside (to/from the internal corporate network and to/from outer side network) from the system through firewall.
 
Procedures/Methods-

A. Introduction-

1.Firewall
2.Firewall Characteristics
3.Need of Firewall
4.Limitations of Firewall
 

B. Development-

Palo Alto Networks Firewall, how does it work by WeSecure.NL.mp3
 

C. Practice-

Name Two Column Method
Activity Goals The goal behind this activity is to:
- Understand the requirements of firewall
- Think about the risk on internal network (or system) without firewall.
Duration 10 min.
Number of Students 13
No. of Groups 4 (Group-A,B,C,D)
Description Group-A
"A good firewall should designed like"�"� Group-B
"A good firewall should not designed like"�"�

Group-C
"RKU network with Cyberroam Security"�"� Group-D
"RKU network without Cyberroam Security"�"�

- Make a pair of two group (A Vs. B and C Vs. D).
- Both of the group of one will be given same topic in opposite manner as mentioned below.
- Group-A will compare the points with Group-C and
Group-B will compare with Group-D
- Anyone can comment on points
Outcome After this activity the students will be able to:
- Describe firewall and its characteristics more clearly.
- Learn by comparing and differentiating the topics.
- Understand the importance of security in networks.
 

This Lesson Plan is available at (www.teacherjet.com)