Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

1.3 Do you need a firewall for your smartphone?

The typical argument is – “My computer has access to the Internet and requires a firewall. So, why not my smartphone?”

The answer is both yes and no.

There is a primary difference in the way the apps on the smartphones are used – they are typically clients accessing services from a remote server, unlike in the case of your computer, which has the capability to provide services to other users over the network. This is what is often exploited by attackers. The smartphone and its apps do not provide services to any other smartphone or computer. Therefore, there is no specific need for a firewall that filters incoming and outgoing data traffic.

However, there is ample scope for malware penetrating the smartphone and causing unwanted data traffic that is unsafe. Such traffic going out of your phone can be controlled by firewall functions available in what are termed as ‘Firewall’ apps. Some Firewall apps available for Android and iOS are listed below:

  • NoRoot Firewall, NetGuard, Mobiwol for Android OS
  • Guardian, Lockdown for iOS

Activity 1 Firewall

Timing: Allow about 10 minutes

Rules play an important part in administering firewalls. The rules govern what network traffic can enter or leave your personal computer or network. Most firewalls come with some preconfigured rules, but most likely you will have to add more rules. After the rules are in place, a firewall examines all network traffic and drops the traffic if the rules prohibit it. The firewall rules may include:

  • Allow everyone to access all websites.
  • Allow outgoing email from the internal mail server or your personal computer.
  • Drop all outgoing network traffic unless it matches the first two rules.

Now, imagine you are a network admin for an office that trades stocks and shares. These are the company’s requirements:

  1. You want the staff to access the internet to keep track of the stock markets and other financial information.
  2. You don’t want your staff to send emails to external contacts to avoid insider trading.
  3. Your staff should be able to communicate with each other on internal email.

Can you draft three rules to the firewall that you think would be appropriate for this company?

Note any ideas in the space provided below:

To use this interactive functionality a free OU account is required. Sign in or register.
Interactive feature not available in single page view (see it in standard view).

Answer

  1. Allow everyone to access all websites.
  2. Drop outgoing email to external contacts.
  3. Allow outgoing emails from internet mail server to internal contacts.
CYBER_B2

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371