Curriculum
Course: Cyber Security
Login

Curriculum

Cyber Security

Text lesson

Content Control

As applications are identified, the firewall can attempt to reveal specific content being downloaded, such as:

  • Word documents
  • Executables
  • Source code
  • Scripts

content control 1

Within these files, the firewall can attempt to identify malware, as well as proprietary and confidential information that should not leave the network.

The firewall can support various protocols and the content transmitted through them, such as:

  • HTTP
  • SMB
  • FTP
  • IMAP & POP3
  • SMTP

Sandboxing

In this context, sandboxing refers to a platform that executes potentially malicious files in a controlled environment. The sandbox monitors and records the file’s activities to determine whether it is harmful or not.

content control 2

Sandboxing typically enables the firewall to redirect executable files to this controlled environment, preventing users from downloading them until a determination is made regarding their potential maliciousness.

A modern sandbox can run files on various platforms, such as:

  • Windows 7, 8, and 10
  • Android devices
  • Linux

Files of interest for execution and analysis in a sandbox go beyond just executable files. Many types of files can perform malicious actions on users’ operating systems, including:

  • ZIP files containing executable content
  • Office documents
  • PDF files
  • Java applications
  • JavaScript files
  • Screensavers

There are several online sandboxes available for you to try, in addition to what a Next-Generation Firewall (NGFW) can offer:

  • https://www.joesandbox.com/
  • https://www.virustotal.com/
  • https://www.hybrid-analysis.com/
  • https://any.run/

You can also install your own sandboxes, such as:

  • https://cuckoosandbox.org/