SlideShare a Scribd company logo
1 of 31
Download to read offline
‫أﻓﻀﻠﯿﻪ‬‫ﺑﺘﻘ‬ ‫اﻟﺸﺒﻜﺎت‬ ‫ﺣﻤﺎﻳﺔ‬‫ﻨﯿﺔ‬
‫اﻟﺤﻤﺎﻳﺔ‬ ‫ﺟﺪار‬
	
‫اﻟرﻗم‬‫اﻻﻛﺎدﯾﻣﻲ‬ 	 ‫	اﻻﺳم‬
439152276	 ‫ﻣﻧﺻوراﻟﻌﺻﯾﻣﻲ‬ ‫	ﻓﮭد‬
439130510	 ‫اﻟﺣرﺑﻲ‬ ‫ﺟﻣﻌﺎن‬ ‫	واﺋل‬
‫ﺗﺣت‬‫أﺑراھﯾم‬ /‫م‬ :‫اﺷراف‬‫اﻟﻌدﯾﻧﻲ‬
Table	of	Contents	
1.	Title	......................................................................................................................................................................................	2	
2.	Introduction	........................................................................................................................................................................	2	
3.	Literature	View	..................................................................................................................................................................	16	
4.	Methodology	and	Research	design	...................................................................................................................................	18	
5.	Data	collection	and	sampling	............................................................................................................................................	20	
5.1	Quantitative	....................................................................................................................................................................	23	
5.2	Qualitative	.......................................................................................................................................................................	24	
5.3	Sample	strategy	and	sample	size	....................................................................................................................................	25	
6.	Data	Analysis	technique	....................................................................................................................................................	28	
7.	References	.........................................................................................................................................................................	30	
Citation	..............................................................................................................................................................................	30
1. Title
‫ﺳﻧﺗﻧﺎول‬‫وﯾر‬ ‫واﻟﺳوﻓت‬ ‫اﻟﮭﺎردوﯾر‬ ‫اﻟﺣﻣﺎﯾﮫ‬ ‫ﺟدار‬ ‫اﺳﺗﺧدام‬ ‫أﻓﺿﻠﯾﮫ‬...
2. Introduction
‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬‫أﻣن‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﻟﺿﻣﺎن‬ ‫ﺑوﺿﻌﮫ‬ ‫اﻟﻣؤﺳﺳﺎت‬ ‫أو‬ ‫اﻟﺷرﻛﺎت‬ ‫ﺗﻘوم‬ ‫اﻟذي‬ ‫اﻟﺟﮭﺎز‬ ‫ھو‬
‫اﻟﺟﮭﺎز‬ ‫ھذا‬ ‫وﺿﻊ‬ ّ‫م‬‫ﯾﺗ‬ ‫ﺑﺣﯾث‬ ،‫ّﺔ‬‫ﯾ‬‫اﻟﺧﺎرﺟ‬ ‫اﻟﺟﮭﺎت‬ ‫ﻣن‬ ‫واﻟﺳرﻗﺔ‬ ‫اﻻﺧﺗراق‬ ‫ﻣن‬ ‫ﺎﺗﮭﺎ‬ّ‫ﻔ‬‫وﻣﻠ‬ ‫ﺑراﻣﺟﮭﺎ‬
ً‫ا‬‫ﺗﺣدﯾد‬‫ﻏﯾر‬ ‫اﻟﺟﮭﺎت‬ ‫ﺗﺣدﯾد‬ ّ‫م‬‫ﯾﺗ‬ ‫ﺑﺣﯾث‬ ،‫اﻹﻧﺗرﻧت‬ ‫وﺷﺑﻛﺔ‬ ‫ﻣﺔ‬ّ‫ظ‬‫ﻟﻠﻣﻧ‬ ‫اﻟداﺧﻠﯾﺔ‬ ‫اﻟﺷﺑﻛﺔ‬ ‫ﻣن‬ ‫ﻛل‬ ‫ﺑﯾن‬
‫اﻟﻣﺷرف‬ ‫إﺑﻼغ‬ ‫ﺛم‬ ،‫ﺑﺎﻟﻣﻧظﻣﺔ‬ ‫اﻟﺧﺎﺻﺔ‬ ‫ّﺔ‬‫ﯾ‬‫اﻟداﺧﻠ‬ ‫اﻟﻛﻣﺑﯾوﺗر‬ ‫ﺷﺑﻛﺔ‬ ‫إﻟﻰ‬ ‫ل‬ّ‫ﻠ‬‫ﺗﺗﺳ‬ ‫واﻟﺗﻲ‬ ‫ﺑﮭﺎ‬ ‫اﻟﻣرﻏوب‬
،‫ّﺔ‬‫ﯾ‬‫اﻟﺧﺎرﺟ‬ ‫اﻟﮭﺟﻣﺎت‬ ‫ﺿد‬ ‫اﻷﻣن‬ ‫ﻟﺗﺣﻘﯾق‬ ‫ﻓﻘط‬ ‫ﯾﺳﺗﺧدم‬ ‫ﻻ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ّ‫ن‬‫ﺑﺄ‬ ً‫ﺎ‬‫ﻋﻠﻣ‬ ،‫ﺑذﻟك‬ ‫اﻟﻧظﺎم‬ ‫ﻋن‬
‫ﺑل‬‫اﻟﻣواﻗﻊ‬ ‫ذﻟك‬ ‫ﻓﻲ‬ ‫ﺑﻣﺎ‬ ،‫إﻟﯾﮭﺎ‬ ‫ﺑﺎﻟدﺧول‬ ‫ﻔﯾن‬ّ‫ظ‬‫ﻟﻠﻣو‬ ‫ﺳﻣﺢ‬ُ‫ﯾ‬ ‫ﻻ‬ ‫اﻟﺗﻲ‬ ‫اﻟﻣواﻗﻊ‬ ‫ﻟﺗﺣدﯾد‬ ‫اﺳﺗﺧداﻣﮫ‬ ‫ﯾﻣﻛن‬
‫وﻏﯾرھﺎ‬ ،‫اﻷﺧﺑﺎر‬ ‫واﻟﻣواﻗﻊ‬ ،‫اﻷﻟﻌﺎب‬ ‫ﻛﻣواﻗﻊ‬ ،‫اﻟوﻗت‬ ‫إھدار‬ ‫إﻟﻰ‬ ‫ّي‬‫د‬‫ﺗؤ‬ ‫اﻟﺗﻲ‬.‫إدارة‬ ‫ﻋﻠﻰ‬ ‫ﺗﻌﻣل‬
‫ﻣﻧﻊ‬ ‫أو‬ ‫ﺑﻣرور‬ ‫ﺗﺳﻣﺢ‬ ‫ﺣﯾث‬ .‫اﻟﺣﺎﺳوب‬ ‫إﻟﻰ‬ ‫واﻟواردة‬ ،‫ﻣن‬ ‫اﻟﺻﺎدرة‬ ‫ّﺔ‬‫ﯾ‬‫اﻟﺷﺑﻛ‬ ‫اﻻﺗﺻﺎﻻت‬ ‫ﺣرﻛﺔ‬
‫ھذه‬‫ﻋﺑﺎرة‬ ‫اﻟﻧﺎري‬ ‫اﻟﺟدار‬ ‫ﯾﻛون‬ ‫ﻗد‬ ‫ﻛﻣﺎ‬ .‫ﺎ‬ً‫ﻘ‬‫ﺳﺎﺑ‬ ‫ﻓﺔ‬ّ‫ﻣﻌر‬ ‫ّدة‬‫د‬‫ﻣﺣ‬ ‫ﻗواﻋد‬ ‫إﻟﻰ‬ ‫ﺑﺎﻻﺳﺗﻧﺎد‬ ‫اﻻﺗﺻﺎﻻت‬
‫ﺷﺑﻛﺔ‬ ‫وﺑﯾن‬ ‫اﻟﺷرﻛﺎت‬ ‫ﻹﺣدى‬ ‫اﻟداﺧﻠﯾﺔ‬ ‫اﻟﺷﺑﻛﺔ‬ ‫ﺑﯾن‬ ‫وﺻل‬ ‫ھﻣزة‬ ‫ﯾﺷﻛل‬ ‫ﺑذاﺗﮫ‬ ‫ﻣﺳﺗﻘل‬ ‫ﺟﮭﺎز‬ ‫ﻋن‬
‫اﻻﻧﺗرﻧت‬.
‫ﺷﮭرة‬ ‫أﻛﺛر‬ ‫اﻷﺧﯾر‬ ‫اﻻﺳم‬ ‫وھذا‬ ،(‫اﻟﻧﺎري‬ ‫)اﻟﺟدار‬ ‫وھو‬ ‫آﺧر‬ ‫ﺑﺎﺳم‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﯾﺳﻣﻰ‬ً‫واﺳﺗﻌﻣﺎﻻ‬
‫اﻟﺗﺳﻣﯾﺔ‬ ‫ﻣن‬ ‫ﻣﺗرﺟﻣﺔ‬ ‫ﺗﺳﻣﯾﺔ‬ ‫ھﻲ‬ ‫اﻟﻧﺎري‬ ‫ﺑﺎﻟﺟدار‬ ‫اﻟﺟدار‬ ‫ھذا‬ ‫وﺗﺳﻣﯾﺔ‬ ،‫اﻷول‬ ‫اﻻﺳم‬ ‫ﻣن‬
‫اﻹﻧﺟﻠﯾزﯾﺔ‬(Firewall)‫ﺑﺎﻟﺟدار‬ ‫اﻟﺣﺎﺳوب‬ ‫ﻋﻠﻰ‬ ‫ﯾﻌﻣل‬ ‫اﻟذي‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺗﺳﻣﯾﺔ‬ ‫ﻓﻲ‬ ‫واﻟﺳﺑب‬
‫اﻟﻧﺎري‬
‫ﻓﻲ‬ ‫ﺗﺄﺳﯾﺳﮫ‬ ‫ﯾﺗم‬ ‫اﻟذي‬ ‫اﻟﻌﺎزل‬ ‫اﻟﻧﺎري‬ ‫اﻟﺟدار‬ ‫ﻋﻣل‬ ‫ﻣﺑدأ‬ ‫وﺑﯾن‬ ،‫ﻋﻣﻠﮫ‬ ‫ﻣﺑدأ‬ ‫ﺑﯾن‬ ‫اﻟﺗﺷﺎﺑﮫ‬ ‫ھو‬،‫اﻟﻣﺑﺎﻧﻲ‬
‫أﺧ‬ ‫إﻟﻰ‬ ‫ﻣﺑﻧﻰ‬ ‫ﻣن‬ ‫أو‬ ،‫أﺧرى‬ ‫إﻟﻰ‬ ‫ﻏرﻓﺔ‬ ‫ﻣن‬ ‫اﻟﺣرﯾق‬ ‫اﻧﺗﺷﺎر‬ ‫ﻣﻧﻊ‬ ‫ﻋﻠﻰ‬ ‫ﯾﻌﻣل‬ ‫واﻟذي‬.‫ر‬
‫ﺗﻌد‬‫ﻣن‬ ‫ﻷﻛﺛر‬ ‫اﻟﺷﺑﻛﺎت‬ ‫أﻣن‬ ‫ﻓﻲ‬ ‫اﻷول‬ ‫اﻟدﻓﺎع‬ ‫ﺧط‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدران‬25‫ا‬ً‫ﺣﺎﺟز‬ ‫ﺗﺿﻊ‬ ‫ﻓﮭﻲ‬ .‫ﺎ‬ً‫ﻣ‬‫ﻋﺎ‬
‫ﻏﯾر‬ ‫اﻟﺧﺎرﺟﯾﺔ‬ ‫واﻟﺷﺑﻛﺎت‬ ‫ﺑﮭﺎ‬ ‫اﻟوﺛوق‬ ‫ﯾﻣﻛن‬ ‫اﻟﺗﻲ‬ ‫واﻟﻣﺳﯾطرة‬ ‫اﻵﻣﻧﺔ‬ ‫اﻟداﺧﻠﯾﺔ‬ ‫اﻟﺷﺑﻛﺎت‬ ‫ﺑﯾن‬
‫اﻟﻣوﺛوق‬.‫اﻹﻧﺗرﻧت‬ ‫ﻣﺛل‬ ، ‫ﺑﮭﺎ‬
‫ﻓﯾﻌد‬‫اﺧﺗراق‬ ‫ﻣﻧﻊ‬ ‫ﻓﻲ‬ ‫ﯾﺳﺗﻌﻣل‬ ‫اﻷوﻟﻰ‬ ‫اﻟﺣﺎﻟﺔ‬ ‫ﻓﻲ‬ .‫اﻟﻣﺑﺎﻧﻲ‬ ‫ﺗرﻛﯾب‬ ‫ﻓﻲ‬ ‫اﻟﺣرﯾق‬ ‫أﺑواب‬ ‫إﻟﻰ‬ ‫ﻣﺷﺎﺑﮫ‬
‫أو‬ ‫ﺑﮭو‬ ‫إﻟﻰ‬ (‫)ﺧﺎرﺟﯾﺔ‬ ‫ﻣﻧطﻘﺔ‬ ‫ﻣن‬ ‫اﻟﺣرﯾق‬ ‫دﺧول‬ ‫ﯾﻌطل‬ ‫اﻟﺛﺎﻧﯾﺔ‬ ‫اﻟﺣﺎﻟﺔ‬ ‫وﻓﻲ‬ ،‫اﻟﺧﺎﺻﺔ‬ ‫اﻟﺷﺑﻛﺔ‬
‫داﺧﻠﯾﺔ‬ ‫ﻏرﻓﺔ‬.‫اﻟﺣرﯾق‬ ‫أﺑواب‬ ‫إﻟﻰ‬ ‫ﻣﺷﺎﺑﮫ‬ ‫ھو‬ ‫اﻟﺷﺑﻛﺔ‬ ‫داﺧل‬ ‫ﻣن‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫وظﯾﻔﺔ‬‫ﺗرﻛﯾب‬ ‫ﻓﻲ‬
‫ﯾﻌطل‬ ‫اﻟﺛﺎﻧﯾﺔ‬ ‫اﻟﺣﺎﻟﺔ‬ ‫وﻓﻲ‬ ،‫اﻟﺧﺎﺻﺔ‬ ‫اﻟﺷﺑﻛﺔ‬ ‫اﺧﺗراق‬ ‫ﻣﻧﻊ‬ ‫ﻓﻲ‬ ‫ﯾﺳﺗﻌﻣل‬ ‫اﻷوﻟﻰ‬ ‫اﻟﺣﺎﻟﺔ‬ ‫ﻓﻲ‬ .‫اﻟﻣﺑﺎﻧﻲ‬
‫داﺧﻠﯾﺔ‬ ‫ﻏرﻓﺔ‬ ‫أو‬ ‫ﺑﮭو‬ ‫إﻟﻰ‬ (‫)ﺧﺎرﺟﯾﺔ‬ ‫ﻣﻧطﻘﺔ‬ ‫ﻣن‬ ‫اﻟﺣرﯾق‬ ‫دﺧول‬.‫ﺟدران‬ ‫ﺗﺻﻧﯾف‬ ‫ﯾﺗم‬ ‫ﻣﺎ‬ ‫ﺎ‬ً‫ﺑ‬‫ﻏﺎﻟ‬
‫ﺟدران‬ ‫ﺗﻘوم‬ .‫اﻟﻣﺿﯾف‬ ‫إﻟﻰ‬ ‫ﺗﺳﺗﻧد‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدران‬ ‫أو‬ ‫ﻟﻠﺷﺑﻛﺔ‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدران‬ ‫أﻧﮭﺎ‬ ‫ﻋﻠﻰ‬ ‫اﻟﺣﻣﺎﯾﺔ‬
‫ﺗﻌﻣل‬ .‫اﻟﺷﺑﻛﺔ‬ ‫أﺟﮭزة‬ ‫ﻋﻠﻰ‬ ‫وﺗﺷﻐﯾﻠﮭﺎ‬ ‫أﻛﺛر‬ ‫أو‬ ‫ﺷﺑﻛﺗﯾن‬ ‫ﺑﯾن‬ ‫اﻟﻣرور‬ ‫ﺣرﻛﺔ‬ ‫ﺑﺗﺻﻔﯾﺔ‬ ‫ﻟﻠﺷﺑﻛﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬
‫ﻣرور‬ ‫ﺣرﻛﺔ‬ ‫ﻓﻲ‬ ‫وﺗﺗﺣﻛم‬ ‫اﻟﻣﺿﯾﻔﺔ‬ ‫اﻟﻛﻣﺑﯾوﺗر‬ ‫أﺟﮭزة‬ ‫ﻋﻠﻰ‬ ‫اﻟﻣﺿﯾف‬ ‫إﻟﻰ‬ ‫اﻟﻣﺳﺗﻧدة‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدران‬
‫وﺧﺎرﺟﮭﺎ‬ ‫اﻷﺟﮭزة‬ ‫ﺗﻠك‬ ‫داﺧل‬ ‫اﻟﺷﺑﻛﺔ‬.
‫ﻻ‬‫ﯾﻣﻛن‬‫ﻷﺣد‬‫أن‬‫ﯾﻧﻛر‬‫ﺣﻘﯾﻘﺔ‬‫أن‬‫اﻟﺻﻌود‬‫اﻟدﯾﻧﺎﻣﯾﻛﻲ‬‫ﻟﻺﻧﺗرﻧت‬‫ﺟﻌل‬‫اﻟﻌﺎﻟم‬‫أﻗرب‬.‫وﻟﻛن‬‫ﻓﻲ‬‫ﻧﻔس‬
‫اﻟوﻗت‬،‫ﺗرﻛﻧﺎ‬‫ﻣﻊ‬‫أﻧواع‬‫ﻣﺧﺗﻠﻔﺔ‬‫ﻣن‬‫اﻟﺗﮭدﯾدات‬‫اﻷﻣﻧﯾﺔ‬.‫ﻟﺿﻣﺎن‬‫ﺳرﯾﺔ‬‫وﺳﻼﻣﺔ‬‫اﻟﻣﻌﻠوﻣﺎت‬‫اﻟﻘﯾﻣﺔ‬
‫ﻟﺷﺑﻛﺔ‬‫اﻟﺷرﻛﺔ‬‫ﻣن‬‫اﻟﮭﺟﻣﺎت‬‫اﻟﺧﺎرﺟﯾﺔ‬،‫ﯾﺟب‬‫أن‬‫ﯾﻛون‬‫ﻟدﯾﻧﺎ‬‫ﺑﻌض‬‫اﻵﻟﯾﺔ‬‫اﻟﻘوﯾﺔ‬.‫ھذا‬‫ھو‬‫اﻟﻣﻛﺎن‬
‫اﻟذي‬‫ﯾظﮭر‬‫ﻓﯾﮫ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬.
‫وراء‬ ‫اﻟﺳﺑب‬ ‫ﻓﻣﺎ‬‫اﻟﺣﻣﺎﯾﺔ؟‬ ‫ﺟدار‬ ‫ﺑﻧﺎء‬
‫ﻣﺟرد‬‫أن‬‫ﺑدأ‬‫ﻣﺳؤوﻟو‬‫أﻧظﻣﺔ‬‫اﻹﻧﺗرﻧت‬‫اﻷواﺋل‬‫ﻓﻲ‬‫ﻓﮭم‬‫أﻧﮭم‬‫ﯾﺗﻌرﺿون‬‫ﻟﻠﮭﺟوم‬‫ﺑﺷﻛل‬‫ﻣﺗﻛرر‬،
‫ﻛﺎن‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫اﻟﺷﺑﻛﺔ‬‫ا‬ً‫أﻣر‬‫ﻻ‬‫ﻣﻔر‬‫ﻣﻧﮫ‬.‫ﻛﺎن‬‫ﻣن‬‫اﻟﻣﻘدر‬‫أن‬‫ﯾﻛون‬‫ھﻧﺎك‬‫ﻧوع‬‫ﻣن‬‫اﻟﻌﻣﻠﯾﺔ‬‫اﻟﺗﻲ‬
‫ﻧظرت‬‫ﻓﻲ‬‫ﺣرﻛﺔ‬‫ﻣرور‬‫اﻟﺷﺑﻛﺔ‬‫ﺎ‬ً‫ﺛ‬‫ﺑﺣ‬‫ﻋن‬‫ﻋﻼﻣﺎت‬‫واﺿﺣﺔ‬‫ﻟﻠﻣﮭﺎﺟﻣﯾن‬.‫ﺑﺎﻟﺿﺑط‬‫ﻛﯾف‬‫ﻛﺎن‬‫ھذا‬
‫اﻟﻌﻣل‬‫ﻛﺎن‬‫أﻗل‬‫وﺿوﺣﺎ‬.
‫ﺳﺗﯾﻔن‬‫ﺑﯾﻠوﻓﯾن‬،‫اﻟذي‬‫ﻛﺎن‬ً‫زﻣﯾﻼ‬‫ﺑﻌد‬‫ذﻟك‬‫ﻓﻲ‬AT & T Labs Research‫ﻓﻲ‬‫ﻓﻠورھﺎم‬
‫ﺑﺎرك‬،‫ﻧﯾوﺟﯾرﺳﻲ‬،‫وأﺳﺗﺎذ‬‫ﺎ‬ً‫ﯾ‬‫ﺣﺎﻟ‬‫ﻓﻲ‬‫ﻗﺳم‬‫ﻋﻠوم‬‫اﻟﻛﻣﺑﯾوﺗر‬‫ﻓﻲ‬‫ﺟﺎﻣﻌﺔ‬‫ﻛوﻟوﻣﺑﯾﺎ‬،‫ﻧﺳب‬ُ‫ﯾ‬‫إﻟﯾﮫ‬
‫اﻟﻔﺿل‬‫ﺑﺷﻛل‬‫ﻋﺎم‬-‫وإن‬‫ﻟم‬‫ﯾﻛن‬‫ﺑﻣﻔرده‬-‫ﻣﻊ‬‫اﺳﺗﺧدام‬‫ﻣﺻطﻠﺢ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻷول‬‫ﻣرة‬
‫ﻟوﺻف‬‫اﻟﻌﻣﻠﯾﺔ‬‫ﻣن‬‫ﺗﺻﻔﯾﺔ‬‫ﺣرﻛﺔ‬‫ﻣرور‬‫اﻟﺷﺑﻛﺔ‬‫ﻏﯾر‬‫اﻟﻣرﻏوب‬‫ﻓﯾﮭﺎ‬،‫ﻓﻲ‬‫وﻗت‬‫ﻣﺎ‬‫ﺣواﻟﻲ‬‫ﻋﺎم‬
1987.‫ﻛﺎن‬‫اﻻﺳم‬‫ا‬ً‫ﻣﺟﺎز‬،‫ﯾﺷﺑﮫ‬‫اﻟﺟﮭﺎز‬‫ﺑﺄﻗﺳﺎم‬‫ﺗﻣﻧﻊ‬‫اﻧدﻻع‬‫ﺣرﯾق‬‫ﻣن‬‫ﺟزء‬‫ﻣن‬‫ھﯾﻛل‬‫ﻣﺎدي‬
‫إﻟﻰ‬‫آﺧر‬.‫ﻓﻲ‬‫ﺣﺎﻟﺔ‬‫اﻟﺷﺑﻛﺎت‬،‫ﻛﺎﻧت‬‫اﻟﻔﻛرة‬‫ھﻲ‬‫إدﺧﺎل‬‫ﻓﻠﺗر‬‫ﻣن‬‫ﻧوع‬‫ﻣﺎ‬‫ﺑﯾن‬‫اﻟﺷﺑﻛﺔ‬‫اﻟداﺧﻠﯾﺔ‬
‫اﻵﻣﻧﺔ‬‫ﺎ‬ً‫ﯾ‬‫ظﺎھر‬‫وأي‬‫ﺣرﻛﺔ‬‫ﻣرور‬‫ﺗدﺧل‬‫أو‬‫ﺗﺧرج‬‫ﻣن‬‫اﺗﺻﺎل‬‫ﺗﻠك‬‫اﻟﺷﺑﻛﺔ‬‫ﺑﺎﻹﻧﺗرﻧت‬‫اﻷوﺳﻊ‬.
‫ظﮭرت‬ ‫ذﻟك‬ ‫ﺑﻌد‬‫ﺗﻘﻧﯾﺔ‬‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬‫ﺗﻌد‬‫ﺗﻘﻧﯾﺔ‬ ‫اﻹﻧﺗرﻧت‬ ‫ﻛﺎﻧت‬ ‫ﻋﻧدﻣﺎ‬ ‫اﻟﺛﻣﺎﻧﯾﻧﺎت‬ ‫أواﺧر‬ ‫ﻓﻲ‬
‫ﻣن‬ ‫ﻟﻌدد‬ ‫اﺳﺗﺟﺎﺑﺔ‬ ‫ظﮭرت‬ ‫اﻷﺳﺎﺳﯾﺔ‬ ‫اﻟﻔﻛرة‬ .‫اﻟﻌﺎﻟﻣﻲ‬ ‫اﻻﺳﺗﺧدام‬ ‫ﺣﯾث‬ ‫ﻣن‬ ‫ﻣﺎ‬ ً‫ﺎ‬‫ﻧوﻋ‬ ‫ﺟدﯾدة‬
‫ﻋﺎم‬ ‫ﻓﻲ‬ ‫اﻟﺛﻣﺎﻧﯾﻧﺎت‬ ‫أواﺧر‬ ‫ﻓﻲ‬ ‫ﺣدﺛت‬ ‫اﻟﺗﻲ‬ ‫اﻹﻧﺗرﻧت‬ ‫ﻟﺷﺑﻛﺔ‬ ‫اﻟرﺋﯾﺳﯾﺔ‬ ‫اﻷﻣﻧﯾﺔ‬ ‫اﻻﺧﺗراﻗﺎت‬1988.
‫اﺑﺣﺎث‬ ‫ﻣرﻛز‬ ‫ﻓﻲ‬ ‫ﻣوظف‬ ‫ﻗﺎم‬"Ames"‫اﻟﺗﺎﺑﻊ‬‫ﻟﻧﺎﺳﺎ‬‫ﻓﻲ‬‫ﻛﺎﻟﯾﻔورﻧﯾﺎ‬‫طرﯾق‬ ‫ﻋن‬ ‫ﻣذﻛرة‬ ‫ﺑﺈرﺳﺎل‬
‫اﻻﻟﻛﺗ‬ ‫اﻟﺑرﯾد‬‫ﻟﻘد‬ ،‫اﻹﻧﺗرﻧت‬ ‫ﻣن‬ ‫ﻓﯾروس‬ ‫ﻣن‬ ‫اﻟﮭﺟوم‬ ‫ﺗﺣت‬ ‫اﻵن‬ ‫"ﻧﺣن‬ ‫ﻓﯾﮭﺎ‬ ً‫ﻼ‬‫ﻗﺎﺋ‬ ‫زﻣﻼﺋﮫ‬ ‫إﻟﻰ‬ ‫روﻧﻲ‬
‫اﯾﻣز‬ ‫وﻧﺎﺳﺎ‬ ‫ﺳﺗﺎﻧﻔورد‬ ،‫ﻣور‬ ‫ﻟﯾﻔﯾر‬ ‫ﻟورﻧس‬ ،‫دﯾﯾﻐو‬ ‫ﺳﺎن‬ ،‫ﺑﯾرﻛﻠﻲ‬ ‫ﺟﺎﻣﻌﺎت‬ ‫أﺻﯾﺑت‬".
‫اﻟواﻗﻌﯾﺔ‬ ‫اﻟﺣوﺳﺑﺔ‬ ‫ﻓﻲ‬ ‫اﺳﺗﺧداﻣﮫ‬ ‫ﻗﺑل‬real Life computing‫ﻓﯾﻠم‬ ‫ﻓﻲ‬ ‫اﻟﻣﺻطﻠﺢ‬ ‫ظﮭر‬ ،
gamersWar‫ﻋﺎم‬ ‫اﻟﻛﻣﺑﯾوﺗر‬ ‫ﻋﻠﻰ‬ ‫ﻟﻠﻘرﺻﻧﺔ‬1983.‫ﺎ‬ً‫ﻘ‬‫ﻻﺣ‬ ‫اﺳﺗﺧداﻣﮫ‬ ‫أﻟﮭم‬ ‫ورﺑﻣﺎ‬ ،
‫ﻋ‬‫ﺑﺎﺳم‬ ‫ﺎ‬ً‫ﺑ‬‫ﻏﺎﻟ‬ ‫إﻟﯾﮭﺎ‬ ‫ﯾﺷﺎر‬ ‫اﻟﺗﻲ‬ ، ‫اﻟﻘدﯾﻣﺔ‬ ‫اﻟﻣﻌدات‬ ‫ﺗظل‬ ، ‫اﻟﺷﺑﻛﺎت‬ ‫ﺗطور‬ ‫ﻣﻊ‬ ، ‫ذﻟك‬ ‫ﻋﻠﻰ‬ ‫ﻼوة‬
‫ﺗﺗم‬ ‫أﻣﺎن‬ ‫وظﯾﻔﺔ‬ .‫ﻣﻌﯾﻧﺔ‬ ‫أﻣﻧﯾﺔ‬ ‫وظﯾﻔﺔ‬ ‫ﻓﻲ‬ ‫اﻟﻣﺷﺎرﻛﺔ‬ ‫ﻋﻠﻰ‬ ‫ﻗﺎدرة‬ ‫ﺗﻛون‬ ‫ﻻ‬ ‫ﻗد‬ ، ‫اﻟﻘدﯾﻣﺔ‬ ‫اﻷﻧظﻣﺔ‬
‫اﺧﺗراق‬ ‫ﻣن‬ ‫ﺗﺗﻣﻛن‬ ‫ﻻ‬ ‫ﻗد‬ ‫وﺑﺎﻟﺗﺎﻟﻲ‬ ، ‫ﺷﺑﻛﺔ‬ ‫إﻟﻰ‬ ‫إﺿﺎﻓﺗﮭﺎ‬، ‫ذﻟك‬ ‫ﻣن‬ ً‫ﻻ‬‫ﺑد‬ .‫ﺑﻧﺟﺎح‬ ‫ﺑﺎﻟﻛﺎﻣل‬ ‫اﻟﺷﺑﻛﺔ‬
‫اﻷﻣﺎن‬ ‫ﻧظﺎم‬ ‫وﺗﻧﻔﯾذ‬ ‫ﺗﻧﺳﯾق‬ ‫ﺗﻌﻘﯾد‬ ‫ﻣن‬ ‫اﻟﺷﺑﻛﺔ‬ ‫ﻓﻲ‬ ‫اﻟﻘدﯾﻣﺔ‬ ‫اﻷﻧظﻣﺔ‬ ‫وﺟود‬ ‫ﯾزﯾد‬.
‫ﻹ‬‫دﺧﺎل‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻓﻲ‬‫ﺷﺑﻛﺔ‬‫اﻟﻛﻣﺑﯾوﺗر‬‫ﻓ‬‫ﮭو‬‫ﺟﮭﺎز‬‫أﻣﺎن‬‫ﻟﻠﺷﺑﻛﺔ‬،‫ﺳواء‬‫ﻛﺎن‬‫ﺎ‬ً‫ﻣ‬‫ﻗﺎﺋ‬‫ﻋﻠﻰ‬
‫اﻷﺟﮭزة‬‫أو‬‫اﻟﺑراﻣﺞ‬،‫واﻟذي‬‫ﯾراﻗب‬‫ﺟﻣﯾﻊ‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫اﻟواردة‬‫واﻟﺻﺎدرة‬‫ًا‬‫د‬‫واﺳﺗﻧﺎ‬‫إﻟﻰ‬
‫ﻣﺟﻣوﻋﺔ‬‫ﻣﺣددة‬‫ﻣن‬‫ﻗواﻋد‬‫اﻷﻣﺎن‬‫اﻟﺗﻲ‬‫ﯾﻘﺑﻠﮭﺎ‬‫أو‬‫ﯾرﻓﺿﮭﺎ‬‫أو‬‫ﯾﺳﻘطﮭﺎ‬‫ﺑﺎﺧﺗﺻﺎر‬ ‫ﺑﮫ‬ ‫ﯾﻘوم‬ ‫ﻓﻣﺎ‬
§‫ﻗﺑول‬:‫اﻟﺳﻣﺎح‬‫ﺑﺣرﻛﺔ‬‫اﻟﻣرور‬
§‫اﻟرﻓض‬:‫ﺣظر‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫وﻟﻛن‬‫اﻟرد‬‫ﺑـ‬"‫ﺧطﺄ‬‫ﻻ‬‫ﯾﻣﻛن‬‫اﻟوﺻول‬‫إﻟﯾﮫ‬"
§‫إﺳﻘﺎط‬:‫ﻣﻧﻊ‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫دون‬‫رد‬
‫ﯾﻧﺷﺊ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ا‬ً‫ﺣﺎﺟز‬‫ﺑﯾن‬‫اﻟﺷﺑﻛﺎت‬‫اﻟداﺧﻠﯾﺔ‬‫اﻵﻣﻧﺔ‬‫واﻟﺷﺑﻛﺔ‬‫اﻟﺧﺎرﺟﯾﺔ‬‫ﻏﯾر‬‫اﻟﻣوﺛوق‬‫ﺑﮭﺎ‬،
‫ﻣﺛل‬‫اﻹﻧﺗرﻧت‬.
‫ﻗﺑل‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬،‫ﺗم‬‫ﺗﻧﻔﯾذ‬‫أﻣﺎن‬‫اﻟﺷﺑﻛﺔ‬‫ﺑواﺳطﺔ‬‫ﻗواﺋم‬‫اﻟﺗﺣﻛم‬‫ﻓﻲ‬‫اﻟوﺻول‬)ACLs(
‫اﻟﻣوﺟودة‬‫ﻋﻠﻰ‬‫أﺟﮭزة‬‫اﻟﺗوﺟﯾﮫ‬Routers.‫ﻗواﺋم‬ACL‫ھﻲ‬‫اﻟﻘواﻋد‬‫اﻟﺗﻲ‬‫ﺗﺣدد‬‫ﻣﺎ‬‫إذا‬‫ﻛﺎن‬
‫ﯾﺟب‬‫ﻣﻧﺢ‬‫اﻟوﺻول‬‫إﻟﻰ‬‫اﻟﺷﺑﻛﺔ‬‫أو‬‫رﻓﺿﮫ‬‫ﻟﻌﻧوان‬IP‫ﻣﻌﯾن‬.
‫ﻟﻛن‬ACLs‫ﻻ‬‫ﯾﻣﻛﻧﮭﺎ‬‫ﺗﺣدﯾد‬‫طﺑﯾﻌﺔ‬‫اﻟﺣزﻣﺔ‬‫اﻟﺗﻲ‬‫ﺗﺣﺟﺑﮭﺎ‬.‫أﯾﺿﺎ‬،ACL‫وﺣده‬‫ﻟﯾس‬‫ﻟدﯾﮫ‬‫اﻟﻘدرة‬
‫ﻋﻠﻰ‬‫إﺑﻘﺎء‬‫اﻟﺗﮭدﯾدات‬‫ﺧﺎرج‬‫اﻟﺷﺑﻛﺔ‬.‫وﺑﺎﻟﺗﺎﻟﻲ‬،‫ﺗم‬‫إدﺧﺎل‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬.
‫ﻟم‬‫ﯾﻌد‬‫اﻻﺗﺻﺎل‬‫ﺑﺎﻹﻧﺗرﻧت‬‫ﺎ‬ً‫ﯾ‬‫اﺧﺗﯾﺎر‬‫ﻟﻠﻣؤﺳﺳﺎت‬.‫وﻣﻊ‬‫ذﻟك‬،‫ﻓﺈن‬‫اﻟوﺻول‬‫إﻟﻰ‬‫اﻹﻧﺗرﻧت‬‫ﯾوﻓر‬
‫ﻓواﺋد‬‫ﻟﻠﻣﻧظﻣﺔ‬‫؛‬‫ﻛﻣﺎ‬‫أﻧﮭﺎ‬‫ﺗﻣﻛن‬‫اﻟﻌﺎﻟم‬‫اﻟﺧﺎرﺟﻲ‬‫ﻣن‬‫اﻟﺗﻔﺎﻋل‬‫ﻣﻊ‬‫اﻟﺷﺑﻛﺔ‬‫اﻟداﺧﻠﯾﺔ‬‫ﻟﻠﻣﻧظﻣﺔ‬.‫ھذا‬
‫ﯾﺧﻠق‬‫ﺗﮭدﯾدا‬‫ﻟﻠﻣﻧظﻣﺔ‬.‫ﻣن‬‫أﺟل‬‫ﺗﺄﻣﯾن‬‫اﻟﺷﺑﻛﺔ‬‫اﻟداﺧﻠﯾﺔ‬‫ﻣن‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫ﻏﯾر‬‫اﻟﻣﺻرح‬‫ﺑﮭﺎ‬،
‫ﻧﺣﺗﺎج‬‫إﻟﻰ‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬
‫اﻟﺗﺷﻐﯾل‬ ‫ﻧظﺎم‬ ‫ﻛﺎن‬ ‫اﻟﺳﺎﺑق‬ ‫ﻓﻔﻲ‬Windows‫ﺛم‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺑرﻧﺎﻣﺞ‬ ‫او‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺑدون‬ ‫ﯾﺎﺗﻲ‬
‫ﺑﺟدار‬ ‫ﯾﺄﺗﻲ‬ ‫اﺻﺑﺢ‬ ‫ذﻟك‬ ‫ﺑﻌد‬‫ﺣﻣﺎﯾﺔ‬‫ﻣﻊ‬XpWindows‫و‬.ً‫ﺎ‬‫اﯾﺿ‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺑﺑرﻧﺎﻣﺞ‬ ‫ﯾﺎﺗﻲ‬ ‫اﺻﺑﺢ‬
‫ﺑراﻣﺞ‬ ‫وھﻧﺎك‬ .‫اﻟﺧﺎﺻﺔ‬ ‫ﻣﮭﻣﺗﮫ‬ ‫ﻣﻧﮭﻣﺎ‬ ‫ﻟﻛل‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫وﺟدار‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺑرﻧﺎﻣﺞ‬ ‫ﺑﯾن‬ ‫ﻓﺎرق‬ ‫ﻓﮭﻧﺎك‬
‫ﺑﺎﻟﺑرﻧﺎﻣﺞ‬ ‫وﺧﺎص‬ ‫ﺑﮭﺎ‬ ‫ﻣرﻓق‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺑﺟدار‬ ‫ﺗﺄﺗﻲ‬ ‫ﺣﻣﺎﯾﺔ‬.
‫اﻟﻌدﯾ‬ ‫ﻓﮭﻧﺎك‬‫اﻟﺗﺳﺎؤﻻت‬ ‫ﻣن‬ ‫د‬... ‫وﻣﻧﮭﺎ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺣول‬
i.‫ﺟداراﻟﺣﻣﺎﯾﺔ؟‬ ‫أﻧواع‬
ii.‫اﻟﺧﺎرﺟﻲ؟‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫وﺑراﻣﺞ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺑﯾن‬ ‫اﻟﻔرق‬ ‫ﻣﺎ‬
iii.‫ﻟل‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫أﻧواع‬ ‫ﻣﺎ‬Windows‫؟‬
iv.‫ھل‬‫ﺗﺛﺑﯾت‬ ‫ﯾﺟب‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻣن‬ ً‫ﻻ‬‫ﺑد‬ ‫ﺧﺎرﺟﻲ‬ ‫ﺣﻣﺎﯾﺔ‬‫ال‬Software‫؟‬
v.‫اﻟﺧﺎرﺟﻲ؟‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻋﯾوب‬
vi.‫اﻧواع‬ ‫ھﻲ‬ ‫ﻣﺎ‬‫اﻟﻔﯾروﺳﺎت؟‬
.. ‫اﻟﺗﺳﺎؤﻻت‬ ‫ھذه‬ ‫ﻋﻠﻰ‬ ‫اﻹﺟﺎﺑﺔ‬ ‫ﻓﺈﻟﯾك‬
I.‫اﺳﺎﺳﯾﺎن‬ ‫ﻧوﻋﺎن‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬‫ﺑراﻣﺞ‬ ‫إﻣﺎ‬)Software(‫ﻣﺎدﯾﺔ‬ ‫أﺟﮭزة‬ ‫أو‬
)Hardware(‫اﻷﻓﺿل‬ ‫ﻣن‬ ‫ﯾﻛون‬ ‫واﻟﺣﻘﯾﻘﺔ‬ ،‫اﻟﻧوﻋﯾن‬ ‫اﻣﺗﻼك‬.
‫ﻧوع‬ ‫ﻣن‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﻓﺟدران‬)Software(‫ﻋﻠﻰ‬ ‫ﺗﺛﺑت‬ ‫ﺑراﻣﺞ‬ ‫ھﻲ‬‫ﻋﻣﻠﮭﺎ‬ ‫ﻟﺗﻌﻣل‬ ‫ﺣﺎﺳب‬ ‫ﻛل‬
‫ﻋﺑور‬ ‫ﺣرﻛﺔ‬ ‫ﺗﻧظﯾم‬ ‫ﻓﻲ‬‫واﻟﺗطﺑﯾﻘﺎت‬ ‫اﻟﻣﻧﺎﻓذ‬ ‫ﺧﻼل‬ ‫اﻟﺑﯾﺎﻧﺎت‬‫اﻟﺗﻠﻘﺎﺋﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺿﻣﻧﮭﺎ‬ ‫ﻓﻣن‬
‫ﻟل‬Windows.‫اﻟﺧﺎرﺟﯾﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫وﺑراﻣﺞ‬
‫ﺗﺗﺿﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬Software‫أي‬‫ﻧوع‬‫ﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﺛﺑﺗﺔ‬‫ﻋﻠﻰ‬‫ﺟﮭﺎز‬‫ﻣﺣﻠﻲ‬
ً‫ﻻ‬‫ﺑد‬‫ﻣن‬‫ﻗطﻌﺔ‬‫ﻣﻧﻔﺻﻠﺔ‬‫ﻣن‬‫اﻷﺟﮭزة‬)‫أو‬‫ﺧﺎدم‬‫ﺳﺣﺎﺑﻲ‬.(‫ﺗﺗﻣﺛل‬‫اﻟﻔﺎﺋدة‬‫اﻟﻛﺑﯾرة‬‫ﻟﺟدار‬‫ﺣﻣﺎﯾﺔ‬
‫اﻟﺑراﻣﺞ‬‫ﻓﻲ‬‫أﻧﮫ‬‫ﻣﻔﯾد‬‫ﻟﻠﻐﺎﯾﺔ‬‫ﻹﻧﺷﺎء‬‫دﻓﺎع‬‫ﺑﻌﻣق‬‫ﻣن‬‫ﺧﻼل‬‫ﻋزل‬‫ﻧﻘﺎط‬‫ﻧﮭﺎﯾﺔ‬‫اﻟﺷﺑﻛﺔ‬‫اﻟﻔردﯾﺔ‬‫ﻋن‬
‫ﺑﻌﺿﮭﺎ‬‫اﻟﺑﻌض‬.‫وﻣﻊ‬‫ذﻟك‬،‫ﻓﺈن‬‫اﻟﺣﻔﺎظ‬‫ﻋﻠﻰ‬‫ﺟدران‬‫ﺣﻣﺎﯾﺔ‬‫اﻟﺑراﻣﺞ‬‫اﻟﻔردﯾﺔ‬‫ﻋﻠﻰ‬‫أﺟﮭزة‬
‫ﻣﺧﺗﻠﻔﺔ‬‫ﯾﻣﻛن‬‫أن‬‫ﯾﻛون‬‫ﺎ‬ً‫ﺑ‬‫ﺻﻌ‬‫وﯾﺳﺗﻐرق‬‫ﺎ‬ً‫ﺗ‬‫وﻗ‬ً‫ﻼ‬‫طوﯾ‬.‫ﻋﻼوة‬‫ﻋﻠﻰ‬‫ذﻟك‬،‫ﻗد‬‫ﻻ‬‫ﯾﻛون‬‫ﻛل‬‫ﺟﮭﺎز‬
‫ﻋﻠﻰ‬‫اﻟﺷﺑﻛﺔ‬‫ﺎ‬ً‫ﻘ‬‫ﻣﺗواﻓ‬‫ﻣﻊ‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﺑرﻧﺎﻣﺞ‬‫واﺣد‬،‫وھو‬‫ﻣﺎ‬‫ﻗد‬‫ﯾﻌﻧﻲ‬‫اﻻﺿطرار‬‫إﻟﻰ‬‫اﺳﺗﺧدام‬
‫ﻋدة‬‫ﺟدران‬‫ﺣﻣﺎﯾﺔ‬‫ﺑراﻣﺞ‬‫ﻣﺧﺗﻠﻔﺔ‬‫ﻟﺗﻐطﯾﺔ‬‫ﻛل‬‫أﺻل‬.
‫اﻟﻧوع‬ ‫ﻣن‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدران‬ ‫أن‬ ‫ﺣﯾن‬ ‫ﻓﻲ‬)Hardware(‫ﺑﯾن‬ ‫ﺗوﺿﻊ‬ ‫ﻣﺎدﯾﺔ‬ ‫أﺟﮭزة‬ ‫ﻋن‬ ‫ﻋﺑﺎرة‬
‫اﻟ‬ ‫وﺣﺎﺳﺑك‬ ‫اﻟﺧﺎرﺟﯾﺔ‬ ‫اﻟﺷﺑﻛﺔ‬‫ﺗﻲ‬‫اﻟﺧﺎرﺟﯾ‬ ‫واﻟﺷﺑﻛﺔ‬ ‫ﺣﺎﺳﺑك‬ ‫ﺑﯾن‬ ‫اﻟوﺻﻠﺔ‬ ‫ﺗﻣﺛل‬‫ال‬ ‫ﻣﺛل‬ ‫ﺔ‬
Routers.
‫ﺗﺳﺗﺧدم‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬Hardware‫ا‬ً‫ﺟﮭﺎز‬‫ﺎ‬ً‫ﯾ‬‫ﻓﻌﻠ‬‫ﯾﻌﻣل‬‫ﺑطرﯾﻘﺔ‬‫ﻣﺷﺎﺑﮭﺔ‬‫ﻟﻣوﺟﮫ‬‫ﺣرﻛﺔ‬
‫اﻟﻣرور‬‫ﻻﻋﺗراض‬‫ﺣزم‬‫اﻟﺑﯾﺎﻧﺎت‬‫وطﻠﺑﺎت‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫ﻗﺑل‬‫ﺗوﺻﯾﻠﮭﺎ‬‫ﺑﺧوادم‬‫اﻟﺷﺑﻛﺔ‬.
‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﺎدﯾﺔ‬‫اﻟﻘﺎﺋﻣﺔ‬‫ﻋﻠﻰ‬‫اﻷﺟﮭزة‬‫ﻣﺛل‬‫ھذا‬‫اﻟﺗﻔوق‬‫ﻓﻲ‬‫أﻣﺎن‬‫اﻟﻣﺣﯾط‬‫ﻣن‬‫ﺧﻼل‬
‫اﻟﺗﺄﻛد‬‫ﻣن‬‫اﻋﺗراض‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫اﻟﺿﺎرة‬‫ﻣن‬‫ﺧﺎرج‬‫اﻟﺷﺑﻛﺔ‬‫ﻗﺑل‬‫ﺗﻌرض‬‫ﻧﻘﺎط‬‫ﻧﮭﺎﯾﺔ‬‫ﺷﺑﻛﺔ‬
‫اﻟﺷرﻛﺔ‬‫ﻟﻠﻣﺧﺎطر‬.‫وﻣﻊ‬‫ذﻟك‬،‫ﻓﺈن‬‫ﻧﻘطﺔ‬‫اﻟﺿﻌف‬‫اﻟرﺋﯾﺳﯾﺔ‬‫ﻓﻲ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﺳﺗﻧد‬‫إﻟﻰ‬
‫اﻷﺟﮭزة‬‫ھﻲ‬‫أﻧﮫ‬‫ﺎ‬ً‫ﺑ‬‫ﻏﺎﻟ‬‫ﻣﺎ‬‫ﯾﻛون‬‫ﻣن‬‫اﻟﺳﮭل‬‫ﻋﻠﻰ‬‫اﻟﮭﺟﻣﺎت‬‫اﻟداﺧﻠﯾﺔ‬‫ﺗﺟﺎوزھﺎ‬.‫ﺎ‬ً‫ﺿ‬‫أﯾ‬،‫ﻗد‬
‫ﺗﺧﺗﻠف‬‫اﻟﻘدرات‬‫اﻟﻔﻌﻠﯾﺔ‬‫ﻟﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫اﻷﺟﮭزة‬Hardware‫ًا‬‫د‬‫اﻋﺗﻣﺎ‬‫ﻋﻠﻰ‬‫اﻟﺷرﻛﺔ‬‫اﻟﻣﺻﻧﻌﺔ‬
-‫ﻗد‬‫ﯾﻛون‬‫ﻟدى‬‫اﻟﺑﻌض‬‫ﻗدرة‬‫ﻣﺣدودة‬‫ﻋﻠﻰ‬‫اﻟﺗﻌﺎﻣل‬‫ﻣﻊ‬‫اﻻﺗﺻﺎﻻت‬‫اﻟﻣﺗزاﻣﻧﺔ‬‫ﻣن‬‫ﻏﯾرھﺎ‬.
‫ﻓ‬‫ﺎﻟﻔرق‬‫ﺑﯾن‬‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬Routers‫وﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬
‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬Routers:
‫ﻌرف‬ُ‫ﯾ‬‫اﻟﻣوﺟﮫ‬‫ﺑﺎﻷﺟﮭزة‬‫اﻟﻣﺗﺻﻠﺔ‬‫ﻓﻲ‬‫اﻟﺷﺑﻛﺎت‬.‫ﯾﺗم‬‫اﺳﺗﺧداﻣﮫ‬‫ﻟﺗﺣدﯾد‬‫أﻗﺻر‬‫ﻣﺳﺎر‬‫ﻟﺣزﻣﺔ‬
‫ﻟﺗﺣﻘﯾق‬‫ھدﻓﮭﺎ‬.‫اﻟﻐرض‬‫اﻟرﺋﯾﺳﻲ‬‫ﻣن‬‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬‫ھو‬‫إرﻓﺎق‬‫ﺷﺑﻛﺎت‬‫ﻣﺧﺗﻠﻔﺔ‬‫ﻓﻲ‬‫وﻗت‬‫واﺣد‬.
‫ﻣﺛل‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬،‫ﯾﻌﻣل‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﻋﻠﻰ‬‫طﺑﻘﺔ‬‫اﻟﺷﺑﻛﺔ‬‫وﻟﻛﻧﮫ‬‫ﯾﻌﻣل‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﻋﻠﻰ‬‫اﻟطﺑﻘﺔ‬‫اﻟﻣﺎدﯾﺔ‬،
‫وطﺑﻘﺔ‬‫ارﺗﺑﺎط‬‫اﻟﺑﯾﺎﻧﺎت‬‫ﻣن‬‫ﻧﻣوذج‬)OSI(Open Systems Interconnection.
‫ﻋﻠﻰ‬‫ﻋﻛس‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬،‫ﻻ‬‫ﯾﺗﺿﻣن‬‫اﻟﺗﺷﻔﯾر‬‫ﻗﺑل‬‫ﺗوﺟﯾﮫ‬‫اﻟﺷﺑﻛﺎت‬.‫ﻻ‬‫ﯾﺣﻣﻲ‬‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬
‫اﻟﺷﺑﻛﺔ‬‫ﻣن‬‫اﻟﺗﮭدﯾدات‬‫وﻟﻛﻧﮫ‬‫ﯾﺗﺿﻣن‬‫ﺷرط‬‫اﻟﻣﺷﺎرﻛﺔ‬‫ﻟﻣﺷﺎرﻛﺔ‬‫اﺗﺻﺎل‬‫اﻹﻧﺗرﻧت‬‫ﺑﯾن‬‫اﻟﺷﺑﻛﺎت‬.
‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬Firewall
‫ھو‬‫اﻹﺻدار‬‫اﻟﻣﺣدد‬‫ﻣن‬‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬.‫ﺗدﺧل‬‫ﺟﻣﯾﻊ‬‫ﺣزم‬‫اﻟﺑﯾﺎﻧﺎت‬‫اﻟﻣوﺟودة‬‫ﺑﮭﺎ‬‫أو‬‫ﺗﺳﻘط‬
‫اﻟﺷﺑﻛﺔ‬‫ﻋﺑر‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫وﺑﻌد‬‫اﻟﺗﺣﻘق‬‫ﻣﻣﺎ‬‫إذا‬‫ﻛﺎن‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﯾﺳﻣﺢ‬‫ﺑذﻟك‬‫أم‬‫ﻻ‬.‫ﯾﺟب‬‫أن‬
‫ﺗﻣر‬‫ﻛل‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫ﻋﺑر‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫وﯾﺟب‬‫أن‬‫ﺗﻣر‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫اﻟﻣﺻرح‬‫ﺑﮭﺎ‬‫ﻓﻘط‬.
‫ﯾﺟب‬‫أن‬‫ﯾﻛون‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺎ‬ً‫ﯾ‬‫ﻗو‬.‫إﻧﮫ‬‫ﻧظﺎم‬‫ﯾﻘﻊ‬‫ﺑﯾن‬‫ﺷﺑﻛﺗﯾن‬‫ﺣﯾث‬‫ﯾﻧﻔذ‬‫ﺳﯾﺎﺳﺔ‬‫اﻟﺗﺣﻛم‬‫ﻓﻲ‬
‫اﻟوﺻول‬‫ﺑﯾن‬‫ﺗﻠك‬‫اﻟﺷﺑﻛﺎت‬.‫ﻣﺛل‬‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬،‫ﯾﻌﻣل‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﻋﻠﻰ‬‫طﺑﻘﺔ‬‫اﻟﺷﺑﻛﺔ‬‫ﻟﻧﻣوذج‬
OSI.‫ﺑﺧﻼف‬‫ﺟﮭﺎز‬‫اﻟﺗوﺟﯾﮫ‬،‫ﯾﺳﺗﺧدم‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﺗﺷﻔﯾر‬‫ﻟﺗﺷﻔﯾر‬‫اﻟﺑﯾﺎﻧﺎت‬‫ﻗﺑل‬‫اﻹرﺳﺎل‬.
‫ﻻ‬‫ﯾﻘوم‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺑﻣﺷﺎرﻛﺔ‬‫اﻟﺷﺑﻛﺔ‬‫وﻟﻛﻧﮫ‬‫ﯾﺗﺿﻣن‬‫ﺗوﻓﯾر‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻟﺣﻣﺎﯾﺔ‬‫اﻟﺷﺑﻛﺔ‬‫ﻣن‬
‫اﻟﺗﮭدﯾدات‬.
‫ﺗطور‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺑطرق‬‫ﻣﺧﺗﻠﻔﺔ‬‫ﻹﻧﺗﺎج‬‫أﻧواع‬‫ﻣﺧﺗﻠﻔﺔ‬‫ﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬.‫ﺳﻧﺗﻧﺎول‬‫ﺧﻣﺳﺔ‬
‫أﻧواع‬‫رﺋﯾﺳﯾﺔ‬‫ﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬،‫وﻟﻛن‬‫اﻟﻌدد‬‫اﻟدﻗﯾق‬‫ﻟﻠﺧﯾﺎرات‬‫ﻟﯾس‬‫ﺑﻧﻔس‬‫أھﻣﯾﺔ‬‫ﻓﻛرة‬‫أن‬
‫اﻷﻧواع‬‫اﻟﻣﺧﺗﻠﻔﺔ‬‫ﻣن‬‫ﻣﻧﺗﺟﺎت‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺗﻘوم‬‫ﺑﺄﺷﯾﺎء‬‫ﻣﺧﺗﻠﻔﺔ‬.‫ﻓﮭﻧﺎك‬6‫ﻟﺟدار‬ ‫ﻣﺧﺗﻠﻔﺔ‬ ‫اﺷﻛﺎل‬
‫اﻟﺣﻣﺎﯾﺔ‬
1(‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬Packet filtering firewall
2(‫ﺑواﺑﺔ‬‫ﻋﻠﻰ‬‫ﻣﺳﺗوى‬‫اﻟداﺋرة‬level gateway-Circuit
3(‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫اﻟﺗﻔﺗﯾش‬‫اﻟدوﻟﺔ‬Stateful inspection firewall
4(‫ﺑواﺑﺔ‬‫ﻋﻠﻰ‬‫ﻣﺳﺗوى‬‫اﻟﺗطﺑﯾق‬
)server	(Proxylevel gateway-Application
5(‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻣن‬‫اﻟﺟﯾل‬‫اﻟﺗﺎﻟﻲ‬generation firewall-Next(NGFW)
6(‫اﻟﺳﺣﺎﺑﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬Cloud Firewall
‫ﯾﻣﻛن‬‫أن‬‫ﺗوﻓر‬‫أﺟﮭزة‬‫وﺧدﻣﺎت‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺣﻣﺎﯾﺔ‬‫ﺗﺗﺟﺎوز‬‫وظﯾﻔﺔ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻘﯾﺎﺳﯾﺔ‬-
‫ﻋﻠﻰ‬‫ﺳﺑﯾل‬‫اﻟﻣﺛﺎل‬،‫ﻣن‬‫ﺧﻼل‬‫ﺗوﻓﯾر‬‫ﻛﺷف‬‫اﻟﺗﺳﻠل‬،‫وﺣﻣﺎﯾﺔ‬‫ھﺟوم‬‫رﻓض‬‫اﻟﺧدﻣﺔ‬‫وﺧدﻣﺎت‬
‫أﻣﻧﯾﺔ‬‫أﺧرى‬‫ﻟﺣﻣﺎﯾﺔ‬‫اﻟﺧوادم‬‫واﻷﺟﮭزة‬‫اﻷﺧرى‬‫داﺧل‬‫اﻟﺷﺑﻛﺔ‬‫اﻟﺧﺎﺻﺔ‬.‫ﻓﻲ‬‫ﺣﯾن‬‫أن‬‫ﺑﻌض‬
‫أﻧواع‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﯾﻣﻛن‬‫أن‬‫ﺗﻌﻣل‬‫ﻛﺄﺟﮭزة‬‫أﻣﺎن‬‫ﻣﺗﻌددة‬‫اﻟوظﺎﺋف‬،‫ﻻ‬‫ﺗﺳﻣﺢ‬‫ﻟﻣﺛل‬‫ھذه‬
‫اﻟﻌروض‬‫ﺑﺻرف‬‫اﻻﻧﺗﺑﺎه‬‫ﻋن‬‫اﻟﺳؤال‬‫اﻟرﺋﯾﺳﻲ‬:‫ھل‬‫ﯾﺣﻣﻲ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ھذا‬‫اﻟﺷﺑﻛﺔ‬
‫اﻟﺧﺎﺻﺔ‬‫ﻣن‬‫اﻟﺗﮭدﯾدات‬‫اﻟﺧﺎرﺟﯾﺔ‬‫ﻣن‬‫ﺧﻼل‬‫ﻓﺣص‬‫وﺣدات‬‫ﺑﯾﺎﻧﺎت‬‫اﻟﺑروﺗوﻛول؟‬
‫ﻛﯾف‬‫ﺗﻌﻣل‬‫اﻷﻧواع‬‫اﻟﻣﺧﺗﻠﻔﺔ‬‫ﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ؟‬
‫ﯾﺗم‬‫إدراج‬‫اﻟﺟدران‬‫اﻟﻧﺎرﯾﺔ‬‫ﺑﺷﻛل‬‫ﻣﺿﻣن‬‫ﻋﺑر‬‫اﺗﺻﺎل‬‫اﻟﺷﺑﻛﺔ‬‫وﺗﻧظر‬‫ﻓﻲ‬‫ﻛل‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬
‫اﻟﺗﻲ‬‫ﺗﻣر‬‫ﻋﺑر‬‫ﺗﻠك‬‫اﻟﻧﻘطﺔ‬.‫أﺛﻧﺎء‬‫ﻗﯾﺎﻣﮭم‬‫ﺑذﻟك‬،‫ﯾﺗم‬‫ﺗﻛﻠﯾﻔﮭم‬‫ﺑﺈﺧﺑﺎر‬‫ﺣرﻛﺔ‬‫ﺑروﺗوﻛول‬‫اﻟﺷﺑﻛﺔ‬
‫اﻟﺣﻣﯾدة‬‫وأي‬‫اﻟﺣزم‬‫ھﻲ‬‫ﺟزء‬‫ﻣن‬‫اﻟﮭﺟوم‬.
‫ﺑرﻧﺎﻣﺞ‬‫اﻟﻛﻣﺑﯾوﺗر‬‫اﻟذي‬‫ﯾﻣﻛن‬‫أن‬‫ﯾﻧظر‬‫ﺑﺷﻛل‬‫ﻋﺎم‬‫إﻟﻰ‬‫ﺳﻠﺳﻠﺔ‬‫ﻣن‬‫ﺗﻌﻠﯾﻣﺎت‬‫اﻟﻛﻣﺑﯾوﺗر‬‫وﯾﺣدد‬
‫ﻧﯾﺗﮫ‬‫ﯾﻌﻣل‬‫ﻓﺟﺄة‬‫ﻓﻲ‬‫أطروﺣﺔ‬‫أﺳﺎﺳﯾﺔ‬‫ﻟﻌﻠوم‬‫اﻟﻛﻣﺑﯾوﺗر‬:‫ﻻ‬‫ﯾﻣﻛن‬‫ﻷي‬‫ﺑرﻧﺎﻣﺞ‬‫ﻛﻣﺑﯾوﺗر‬‫أن‬‫ﯾﺗﻧﺑﺄ‬
‫ﺑﻧﺗﯾﺟﺔ‬‫ﺑرﻧﺎﻣﺞ‬‫ﻛﻣﺑﯾوﺗر‬‫آﺧر‬‫دون‬‫ﺗﺷﻐﯾﻠﮫ‬‫ﻟﻣﻌرﻓﺔ‬‫ﻣﺎ‬‫ﯾﻔﻌﻠﮫ‬.‫ﺑﺎﻻﻣﺗداد‬،‫ﻣن‬‫ﻏﯾر‬‫اﻟﻣﻣﻛن‬‫إﻟﻘﺎء‬
‫ﻧظرة‬‫ﻋﺎﻣﺔ‬‫ﻋﻠﻰ‬‫ﺣرﻛﺔ‬‫ﻣرور‬‫اﻟﺷﺑﻛﺔ‬‫وﺗﻣﯾﯾز‬‫ﻧﯾﺗﮭﺎ‬.
‫وﻣﻊ‬‫ذﻟك‬،‫ﻣن‬‫اﻟﻣﻣﻛن‬‫ﺎ‬ً‫ﻣ‬‫ﺗﻣﺎ‬‫اﻟﺑﺣث‬‫ﻋن‬‫اﻷﻧﻣﺎط‬‫اﻟﻣﻌروﻓﺔ‬‫ﻓﻲ‬‫ﺑﯾﺎﻧﺎت‬‫ﺣزم‬‫اﻟﺷﺑﻛﺔ‬‫اﻟﺗﻲ‬‫ﺗﺷﯾر‬
‫إﻟﻰ‬‫اﻟﮭﺟﻣﺎت‬‫اﻟﺗﻲ‬‫ﺗﻣت‬‫رؤﯾﺗﮭﺎ‬‫ﺎ‬ً‫ﻘ‬‫ﺳﺎﺑ‬،‫وھذا‬‫ﺑﺎﻟﺿﺑط‬‫ﻣﺎ‬‫ﻓﻌﻠﺗﮫ‬‫اﻟﺟدران‬‫اﻟﻧﺎرﯾﺔ‬‫ﻟﺷﺑﻛﺔ‬‫ﺗﺻﻔﯾﺔ‬
‫اﻟﺣزم‬‫اﻟﻣﺑﻛرة‬-‫وﻣﺎ‬‫زاﻟت‬‫ﺗﻔﻌل‬‫ذﻟك‬.‫ﺑﺷﻛل‬‫ﻋﺎم‬،‫ﺑﻐض‬‫اﻟﻧظر‬‫ﻋن‬‫ﻧوع‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟذي‬
‫ﯾﺗم‬‫ﻧﺷره‬‫ﻋﻠﻰ‬‫ﺷﺑﻛﺔ‬،‫ﻓﺈﻧﮫ‬‫ﯾﺗم‬‫ﻧﺷره‬‫ﻣﻊ‬‫ﻣﺟﻣوﻋﺔ‬‫ﻣﺣدﺛﺔ‬‫ﺑﺎﺳﺗﻣرار‬‫ﻣن‬‫ﻗواﻋد‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬
‫اﻟﺗﻲ‬‫ﺗﺣدد‬‫اﻟﻣﻌﺎﯾﯾر‬‫اﻟﺗﻲ‬‫ﺑﻣوﺟﺑﮭﺎ‬‫ﯾﻣﻛن‬‫ﺗوﺟﯾﮫ‬‫ﺣزﻣﺔ‬‫ﻣﻌﯾﻧﺔ‬-‫أو‬‫ﻣﺟﻣوﻋﺔ‬‫ﺣزم‬‫ﻓﻲ‬‫ﻣﻌﺎﻣﻠﺔ‬-
‫ﺑﺄﻣﺎن‬‫إﻟﻰ‬‫ﺟﮭﺎز‬‫اﻟﻣﺳﺗﻠم‬‫اﻟﻣﻘﺻود‬.
‫ﻓﯾﻣﺎ‬‫ﯾﻠﻲ‬‫اﻷﻧواع‬‫اﻟﺧﻣﺳﺔ‬‫ﻟﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﺗﻲ‬‫ﺗﺳﺗﻣر‬‫ﻓﻲ‬‫ﻟﻌب‬‫أدوار‬‫ﻣﮭﻣﺔ‬‫ﻣﻊ‬‫ﺗطور‬‫ﻓﺋﺔ‬
‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬.
1(‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬Packet filtering firewall
‫ﻋﻣل‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻟﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬‫ﺑﺷﻛل‬‫ﻣﺿﻣن‬‫ﻋﻧد‬‫ﻧﻘﺎط‬‫اﻟﺗوﺻﯾل‬‫ﺣﯾث‬‫ﺗﻘوم‬
‫أﺟﮭزة‬‫ﻣﺛل‬‫أﺟﮭزة‬‫اﻟﺗوﺟﯾﮫ‬‫واﻟﻣﺣوﻻت‬‫ﺑﻌﻣﻠﮭﺎ‬.‫وﻣﻊ‬‫ذﻟك‬،‫ﻻ‬‫ﺗﻘوم‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫ھذه‬
‫ﺑﺗوﺟﯾﮫ‬‫اﻟﺣزم‬،‫وﻟﻛﻧﮭﺎ‬ً‫ﻻ‬‫ﺑد‬‫ﻣن‬‫ذﻟك‬‫ﺗﻘﺎرن‬‫ﻛل‬‫ﺣزﻣﺔ‬‫ﺗم‬‫ﺗﻠﻘﯾﮭﺎ‬‫ﺑﻣﺟﻣوﻋﺔ‬‫ﻣن‬‫اﻟﻣﻌﺎﯾﯾر‬
‫اﻟﻣﺣددة‬-‫ﻣﺛل‬‫ﻋﻧﺎوﯾن‬IP‫اﻟﻣﺳﻣوح‬‫ﺑﮭﺎ‬‫وﻧوع‬‫اﻟﺣزﻣﺔ‬‫ورﻗم‬‫اﻟﻣﻧﻔذ‬‫واﻟﺟواﻧب‬‫اﻷﺧرى‬
‫ﻟرؤوس‬‫ﺑروﺗوﻛول‬‫اﻟﺣزﻣﺔ‬.‫ﺑﺷﻛل‬‫ﻋﺎم‬،‫ﯾﺗم‬‫إﺳﻘﺎط‬‫اﻟﺣزم‬‫اﻟﺗﻲ‬‫ﺗم‬‫وﺿﻊ‬‫ﻋﻼﻣﺔ‬‫ﻋﻠﯾﮭﺎ‬
‫ﻋﻠﻰ‬‫أﻧﮭﺎ‬‫ﻣزﻋﺟﺔ‬‫ﺑﺷﻛل‬‫ﻏﯾر‬‫رﺳﻣﻲ‬-‫أي‬‫أﻧﮭﺎ‬‫ﻻ‬‫ﯾﺗم‬‫إﻋﺎدة‬‫ﺗوﺟﯾﮭﮭﺎ‬،‫وﺑﺎﻟﺗﺎﻟﻲ‬،
‫ﺗﺗوﻗف‬‫ﻋن‬‫اﻟوﺟود‬.
ü‫اﻟﺗﮭدﯾدات‬‫اﻷﻣﻧﯾﺔ‬‫ﺗﺻﻔﯾﺔ‬ ‫ﻟﻔﻼﺗر‬‫اﻟﺣزم‬Packet Filters
i.‫اﻧﺗﺣﺎل‬‫ﻋﻧوان‬IP)( IP address Spoofing
‫ﻓﻲ‬‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬‫اﻟﮭﺟﻣﺎت‬،‫ﯾﺣﺎول‬‫ﻣﺗﺳﻠل‬‫ﻣن‬‫اﻟﺧﺎرج‬‫إرﺳﺎل‬‫ﺣزﻣﺔ‬‫ﻧﺣو‬‫ﺷﺑﻛﺔ‬‫اﻟﺷرﻛﺔ‬
‫اﻟداﺧﻠﯾﺔ‬‫ﻣﻊ‬‫ﺗﻌﯾﯾن‬‫ﻋﻧوان‬IP‫اﻟﻣﺻدر‬ٍ‫و‬‫ﻣﺳﺎ‬‫ﻷﺣد‬‫ﻋﻧﺎوﯾن‬IP‫ﻟﻠﻣﺳﺗﺧدﻣﯾن‬‫اﻟداﺧﻠﯾﯾن‬.
o‫اﻟوﻗﺎﯾﺔ‬Prevention:
‫ﯾﻣﻛن‬‫ﻟﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ھزﯾﻣﺔ‬‫ھذا‬‫اﻟﮭﺟوم‬‫إذا‬‫ﺗﺧﻠص‬‫ﻣن‬‫ﺟﻣﯾﻊ‬‫اﻟﺣزم‬‫اﻟﺗﻲ‬‫ﺗﺻل‬‫إﻟﻰ‬
‫اﻟﺟﺎﻧب‬‫اﻟوارد‬‫ﻣن‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬،‫ﻣﻊ‬‫ﻋﻧوان‬IP‫اﻟﻣﺻدر‬‫ﯾﺳﺎوي‬‫أﺣد‬‫ﻋﻧﺎوﯾن‬IP
‫اﻟداﺧﻠﯾﺔ‬.
ii.‫ھﺟﻣﺎت‬‫ﺗوﺟﯾﮫ‬‫اﻟﻣﺻدر‬Source Routing Attack:
‫ﻓﻲ‬‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬‫اﻟﮭﺟوم‬،‫ﯾﺣدد‬‫اﻟﻣﮭﺎﺟم‬‫اﻟﻣﺳﺎر‬‫اﻟذي‬‫ﯾﺟب‬‫أن‬
‫ﺗﺳﻠﻛﮫ‬‫اﻟﺣزﻣﺔ‬‫ﻋﻠﻰ‬‫أﻣل‬‫ﺧداع‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬.
o‫اﻟوﻗﺎﯾﺔ‬Prevention:
‫ﯾﻣﻛن‬‫ﻟﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ھزﯾﻣﺔ‬‫ھذا‬‫اﻟﮭﺟوم‬‫إذا‬‫ﺗﺟﺎھل‬‫ﺟﻣﯾﻊ‬‫اﻟﺣزم‬
‫اﻟﺗﻲ‬‫ﺗﺳﺗﺧدم‬‫ﺧﯾﺎر‬‫ﺗوﺟﯾﮫ‬‫اﻟﻣﺻدر‬‫اﻟﻣﻠﻘب‬‫ﺑﻣﻌﺎﻟﺟﺔ‬‫اﻟﻣﺳﺎر‬.
iii.‫ﻣﺟزﺋﺔ‬ ‫ھﺟﻣﺎت‬‫ﺻﻐ‬‫ﯾرة‬Tiny Fragment Attacks:
‫ﻓﻲ‬‫ﻛﺛﯾر‬‫ﻣن‬‫اﻷﺣﯾﺎن‬،‫ﯾﻛون‬‫ﺣﺟم‬‫ﺣزﻣﺔ‬IP‫أﻛﺑر‬‫ﻣن‬‫اﻟﺣد‬
‫اﻷﻗﺻﻰ‬‫ﻟﻠﺣﺟم‬‫اﻟذي‬‫ﺗﺳﻣﺢ‬‫ﺑﮫ‬‫اﻟﺷﺑﻛﺔ‬‫اﻷﺳﺎﺳﯾﺔ‬‫ﻣﺛل‬Ethernet
‫و‬Token Ring‫وﻣﺎ‬‫إﻟﻰ‬‫ذﻟك‬.‫ﻓﻲ‬‫ﻣﺛل‬‫ھذه‬‫اﻟﺣﺎﻻت‬،‫ﯾﺟب‬‫أن‬
‫ﺗﻛون‬‫اﻟﺣزﻣﺔ‬‫ﻣﺟزأة‬،‫ﺑﺣﯾث‬‫ﯾﻣﻛن‬‫ﻧﻘﻠﮭﺎ‬‫أﻛﺛر‬.‫ﯾﺳﺗﺧدم‬‫اﻟﻣﮭﺎﺟم‬
‫ھذه‬‫اﻟﺧﺎﺻﯾﺔ‬‫ﻟﺑروﺗوﻛول‬TCP / IP.‫ﻓﻲ‬‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬
‫اﻟﮭﺟﻣﺎت‬،‫ﯾﻘوم‬‫اﻟﻣﮭﺎﺟم‬‫ﻋن‬‫ﻗﺻد‬‫ﺑﺈﻧﺷﺎء‬‫أﺟزاء‬‫ﻣن‬‫اﻟﺣزﻣﺔ‬
‫اﻷﺻﻠﯾﺔ‬‫وإرﺳﺎﻟﮭﺎ‬‫ﻟﺧداع‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬.
o‫اﻟوﻗﺎﯾﺔ‬Prevention:
‫ﯾﻣﻛن‬‫ﻟﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ھزﯾﻣﺔ‬‫ھذا‬‫اﻟﮭﺟوم‬‫إذا‬‫ﺗﺧﻠص‬‫ﻣن‬‫ﺟﻣﯾﻊ‬
‫اﻟﺣزم‬‫اﻟﺗﻲ‬‫ﺗﺳﺗﺧدم‬‫ﺑروﺗوﻛول‬TCP‫وﺗم‬‫ﺗﺟزﺋﺗﮭﺎ‬.‫ﺗﺳﻣﺢ‬‫ﻋواﻣل‬
‫ﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬‫اﻟدﯾﻧﺎﻣﯾﻛﯾﺔ‬‫ﺑﺣزم‬TCP‫اﻟواردة‬‫ﻓﻘط‬‫إذا‬‫ﻛﺎﻧت‬
‫اﺳﺗﺟﺎﺑﺎت‬‫ﻟﺣزم‬TCP‫اﻟﺻﺎدرة‬.
2(‫ﺑواﺑﺔ‬‫ﻋﻠﻰ‬‫ﻣﺳﺗوى‬‫اﻟداﺋرة‬level gateway-Circuit
‫ﺑ‬‫ﺎﺳﺗﺧدام‬‫طرﯾﻘﺔ‬‫أﺧرى‬‫ﺳرﯾﻌﺔ‬‫ﺎ‬ً‫ﯾ‬‫ﻧﺳﺑ‬‫ﻟﺗﺣدﯾد‬‫اﻟﻣﺣﺗوى‬‫اﻟﺿﺎر‬،‫ﺗراﻗب‬‫اﻟﺑواﺑﺎت‬
‫ﻋﻠﻰ‬‫ﻣﺳﺗوى‬‫اﻟداﺋرة‬‫ﻣﺻﺎﻓﺣﺎت‬TCP‫ورﺳﺎﺋل‬‫ﺑدء‬‫ﺟﻠﺳﺔ‬‫ﺑروﺗوﻛول‬‫اﻟﺷﺑﻛﺔ‬
‫اﻷﺧرى‬‫ﻋﺑر‬‫اﻟﺷﺑﻛﺔ‬‫ﻋﻧد‬‫إﻧﺷﺎﺋﮭﺎ‬‫ﺑﯾن‬‫اﻟﻣﺿﯾﻔﯾن‬‫اﻟﻣﺣﻠﯾﯾن‬‫واﻟﺑﻌﯾدﯾن‬‫ﻟﺗﺣدﯾد‬‫ﻣﺎ‬‫إذا‬
‫ﻛﺎﻧت‬‫اﻟﺟﻠﺳﺔ‬‫اﻟﺗﻲ‬‫ﯾﺗم‬‫اﻟﺷروع‬‫ﻓﯾﮭﺎ‬‫ﺷرﻋﯾﺔ‬-‫ﯾﻌﺗﺑر‬‫اﻟﻧظﺎم‬‫اﻟﺑﻌﯾد‬‫ﻣوﺛوق‬‫ﺑﮫ‬.‫ﻟﻛﻧﮭم‬
‫ﻻ‬‫ﯾﻔﺣﺻون‬‫اﻟﺣزم‬‫ﺑﺄﻧﻔﺳﮭم‬.
3(‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫اﻟﺗﻔﺗﯾش‬‫اﻟدوﻟﺔ‬Stateful inspection firewall
‫ﻌرف‬ُ‫ﺗ‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﺑﺎﺳم‬"‫ﻋواﻣل‬‫ﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬‫اﻟدﯾﻧﺎﻣﯾﻛﯾﺔ‬"Dynamic Packet Filters
‫ﻣ‬‫ن‬‫ﻧﺎﺣﯾﺔ‬‫أﺧرى‬،‫ﻻ‬‫ﺗﻘوم‬‫اﻷﺟﮭزة‬‫اﻟواﻋﯾﺔ‬‫ﺑﺎﻟﺣﺎﻟﺔ‬‫ﺑﻔﺣص‬‫ﻛل‬‫ﺣزﻣﺔ‬‫ﻓﻘط‬،‫وﻟﻛن‬
‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﺗﺗﺑﻊ‬‫ﻣﺎ‬‫إذا‬‫ﻛﺎﻧت‬‫ھذه‬‫اﻟﺣزﻣﺔ‬‫ا‬ً‫ء‬‫ﺟز‬‫ﻣن‬TCP‫أو‬‫ﺟﻠﺳﺔ‬‫ﻋﻣل‬‫ﺷﺑﻛﺔ‬‫أﺧرى‬.
‫ﯾوﻓر‬‫ھذا‬‫ﺎ‬ً‫ﻧ‬‫أﻣﺎ‬‫أﻛﺛر‬‫ﻣن‬‫ﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬‫أو‬‫ﻣراﻗﺑﺔ‬‫اﻟدواﺋر‬‫ﻓﻘط‬‫وﻟﻛﻧﮫ‬‫ﯾﻔرض‬‫ﺿراﺋب‬
‫أﻛﺑر‬‫ﻋﻠﻰ‬‫أداء‬‫اﻟﺷﺑﻛﺔ‬.
‫ھﻧﺎك‬‫ﻧوع‬‫آﺧر‬‫ﻣن‬‫اﻟﻔﺣص‬‫ذي‬‫اﻟﺣﺎﻟﺔ‬‫ھو‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻣﺗﻌدد‬‫اﻟطﺑﻘﺎت‬،‫اﻟذي‬‫ﯾﺄﺧذ‬‫ﻓﻲ‬
‫اﻻﻋﺗﺑﺎر‬‫ﺗدﻓق‬‫اﻟﻣﻌﺎﻣﻼت‬‫اﻟﺟﺎرﯾﺔ‬‫ﻋﺑر‬‫طﺑﻘﺎت‬‫ﺑروﺗوﻛول‬‫ﻣﺗﻌددة‬‫ﻣن‬‫ﻧﻣوذج‬‫اﻟرﺑط‬‫اﻟﺑﯾﻧﻲ‬
‫ﻟﻸﻧظﻣﺔ‬‫اﻟﻣﻔﺗوﺣﺔ‬)OSI(‫اﻟﻣؤﻟف‬‫ﻣن‬‫ﺳﺑﻊ‬‫طﺑﻘﺎت‬.
4(‫ﺑواﺑﺔ‬‫ﻋﻠﻰ‬‫ﻣﺳﺗوى‬‫اﻟﺗطﺑﯾق‬
)Proxy server(level gateway-Application
‫ﯾﺟﻣﻊ‬‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬‫اﻷﺟﮭزة‬-‫ﻣن‬‫اﻟﻧﺎﺣﯾﺔ‬‫اﻟﻔﻧﯾﺔ‬ً‫وﻛﯾﻼ‬‫وﯾﺷﺎر‬‫إﻟﯾﮫ‬‫ﺎ‬ً‫ﻧ‬‫أﺣﯾﺎ‬
‫ﺑﺎﺳم‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫اﻟوﻛﯾل‬-‫ﺑﯾن‬‫ﺑﻌض‬‫ﺳﻣﺎت‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻟﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬
‫ﻣﻊ‬‫ﺑواﺑﺎت‬‫ﻣﺳﺗوى‬‫اﻟداﺋرة‬.‫ﺗﻘوم‬‫ﺑﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬‫ﻟﯾس‬‫ﻓﻘط‬‫ﺎ‬ً‫ﻘ‬‫وﻓ‬‫ﻟﻠﺧدﻣﺔ‬‫اﻟﺗﻲ‬
‫ﺗم‬‫ﺗﺧﺻﯾﺻﮭﺎ‬‫ﻟﮭﺎ‬-‫ﻛﻣﺎ‬‫ھو‬‫ﻣﺣدد‬‫ﺑواﺳطﺔ‬‫ﻣﻧﻔذ‬‫اﻟوﺟﮭﺔ‬-‫وﻟﻛن‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬
‫ﺑﺧﺻﺎﺋص‬‫أﺧرى‬‫ﻣﻌﯾﻧﺔ‬،‫ﻣﺛل‬‫ﺳﻠﺳﻠﺔ‬‫طﻠب‬HTTP.
‫ﻋﻠﻰ‬ ‫ﯾﻌﻣل‬3‫ﺧطوات‬
‫اﻟﺧطوة‬1:‫ﯾﺗﺻل‬‫اﻟﻣﺳﺗﺧدم‬‫ﺑﺑواﺑﺔ‬‫اﻟﺗطﺑﯾق‬‫ﺑﺎﺳﺗﺧدام‬‫ﺗطﺑﯾق‬TCP /
IP‫ﻣﺛل‬HTTP.
‫اﻟﺧطوة‬2:‫ﺗﺳﺄل‬‫ﺑواﺑﺔ‬‫اﻟﺗطﺑﯾق‬‫ﻋن‬‫اﻟﻣﺿﯾف‬‫اﻟﺑﻌﯾد‬‫اﻟذي‬‫ﯾرﯾد‬
‫اﻟﻣﺳﺗﺧدم‬‫إﻧﺷﺎء‬‫اﺗﺻﺎل‬‫ﻣﻌﮫ‬.‫ﻛﻣﺎ‬‫ﺗطﻠب‬‫ﻣﻌرف‬‫اﻟﻣﺳﺗﺧدم‬‫وﻛﻠﻣﺔ‬
‫اﻟﻣرور‬‫اﻟﻣطﻠوﺑﺔ‬‫ﻟﻠوﺻول‬‫إﻟﻰ‬‫ﺧدﻣﺎت‬‫ﺑواﺑﺔ‬‫اﻟﺗطﺑﯾق‬.
‫اﻟﺧطوة‬3:‫ﺑﻌد‬‫اﻟﺗﺣﻘق‬‫ﻣن‬‫ﺻﺣﺔ‬‫اﻟﻣﺳﺗﺧدم‬،‫ﺗﺻل‬‫ﺑواﺑﺔ‬‫اﻟﺗطﺑﯾق‬
‫إﻟﻰ‬‫اﻟﻣﺿﯾف‬‫اﻟﺑﻌﯾد‬‫ﻧﯾﺎﺑﺔ‬‫ﻋن‬‫اﻟﻣﺳﺗﺧدم‬‫ﻟﺗﺳﻠﯾم‬‫اﻟﺣزم‬.
‫ﺑﯾﻧﻣﺎ‬‫ﺗوﻓر‬‫اﻟﻣداﺧل‬‫اﻟﺗﻲ‬‫ﺗﻘوم‬‫ﺑﺎﻟﻔﻠﺗر‬‫ﻓﻲ‬‫طﺑﻘﺔ‬‫اﻟﺗطﺑﯾق‬‫ﺎ‬ً‫ﻧ‬‫أﻣﺎ‬‫ا‬ً‫ﻛﺑﯾر‬‫ﻟﻠﺑﯾﺎﻧﺎت‬،
‫إﻻ‬‫أﻧﮭﺎ‬‫ﯾﻣﻛن‬‫أن‬‫ﺗؤﺛر‬‫ﺑﺷﻛل‬‫ﻛﺑﯾر‬‫ﻋﻠﻰ‬‫أداء‬‫اﻟﺷﺑﻛﺔ‬.
5(‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻣن‬‫اﻟﺟﯾل‬‫اﻟﺗﺎﻟﻲ‬generation firewall-Next(NGFW)
‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻣن‬‫اﻟﺟﯾل‬‫اﻟﺗﺎﻟﻲ‬PALO ALTO NETWORKS
‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﻣﺗطور‬‫ﻣن‬‫اﻟﺟﯾل‬‫اﻟﺗﺎﻟﻲ‬‫ﻣن‬Palo Alto Networks،‫واﻟذي‬‫ﻛﺎن‬
‫ﻣن‬‫ﺑﯾن‬‫أواﺋل‬‫اﻟﺑﺎﺋﻌﯾن‬‫اﻟذﯾن‬‫ﯾﻘدﻣون‬‫ﻣﯾزات‬‫ﻣﺗﻘدﻣﺔ‬،‫ﻣﺛل‬‫ﺗﺣدﯾد‬‫اﻟﺗطﺑﯾﻘﺎت‬‫اﻟﺗﻲ‬
‫ﺗﻧﺗﺞ‬‫ﻛل‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫اﻟﺗﻲ‬‫ﺗﻣر‬‫ﻋﺑر‬‫وﺗﺗﻛﺎﻣل‬‫ﻣﻊ‬‫ﻣﻛوﻧﺎت‬‫اﻟﺷﺑﻛﺔ‬‫اﻟرﺋﯾﺳﯾﺔ‬
‫اﻷﺧرى‬،‫ﻣﺛل‬Active Directory.
‫ﯾﺟﻣﻊ‬NGFW‫اﻟﻧﻣوذﺟﻲ‬‫ﺑﯾن‬‫ﻓﺣص‬‫اﻟﺣزﻣﺔ‬‫واﻟﺗﻔﺗﯾش‬‫اﻟدﻗﯾق‬،‫وﯾﺗﺿﻣن‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬
‫ﻣﺟﻣوﻋﺔ‬‫ﻣﺗﻧوﻋﺔ‬‫ﻣن‬‫ﻓﺣص‬‫اﻟﺣزﻣﺔ‬‫اﻟﻌﻣﯾق‬،‫ﺑﺎﻹﺿﺎﻓﺔ‬‫إﻟﻰ‬‫أﻧظﻣﺔ‬‫أﻣﺎن‬‫اﻟﺷﺑﻛﺔ‬
‫اﻷﺧرى‬،‫ﻣﺛل‬‫ﻛﺷف‬/‫ﻣﻧﻊ‬‫اﻟﺗطﻔل‬،‫وﺗﺻﻔﯾﺔ‬‫اﻟﺑراﻣﺞ‬‫اﻟﺿﺎرة‬‫وﻣﻛﺎﻓﺣﺔ‬
‫اﻟﻔﯾروﺳﺎت‬.
‫ﺑﯾﻧﻣﺎ‬‫ﯾﻧظر‬‫ﻓﺣص‬‫اﻟﺣزﻣﺔ‬‫ﻓﻲ‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﺗﻘﻠﯾدﯾﺔ‬‫ﺎ‬ً‫ﯾ‬‫ﺣﺻر‬‫إﻟﻰ‬‫رأس‬
‫ﺑروﺗوﻛول‬‫اﻟﺣزﻣﺔ‬،‫ﯾﺑﺣث‬‫ﻓﺣص‬‫اﻟﺣزﻣﺔ‬‫اﻟﻌﻣﯾق‬‫ﻓﻲ‬‫اﻟﺑﯾﺎﻧﺎت‬‫اﻟﻔﻌﻠﯾﺔ‬‫اﻟﺗﻲ‬‫ﺗﺣﻣﻠﮭﺎ‬
‫اﻟﺣزﻣﺔ‬.‫ﯾﺗﺗﺑﻊ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻌﻣﯾق‬‫ﻟﻔﺣص‬‫اﻟﺣزم‬‫ﺗﻘدم‬‫ﺟﻠﺳﺔ‬‫ﺗﺻﻔﺢ‬‫اﻟوﯾب‬‫وﯾﻛون‬
‫ا‬ً‫ﻗﺎدر‬‫ﻋﻠﻰ‬‫ﻣﻼﺣظﺔ‬‫ﻣﺎ‬‫إذا‬‫ﻛﺎﻧت‬‫ﺣﻣوﻟﺔ‬‫اﻟﺣزﻣﺔ‬،‫ﻋﻧد‬‫ﺗﺟﻣﯾﻌﮭﺎ‬‫ﻣﻊ‬‫ﺣزم‬‫أﺧرى‬‫ﻓﻲ‬
‫رد‬‫ﺧﺎدم‬HTTP،‫ﺗﺷﻛل‬‫اﺳﺗﺟﺎﺑﺔ‬‫ﺷرﻋﯾﺔ‬‫ﺑﺗﻧﺳﯾق‬HTML.
6(‫اﻟﺳﺣﺎﺑﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬Cloud Firewall
‫ﻋﻧدﻣﺎ‬‫ﯾﺗم‬‫اﺳﺗﺧدام‬‫ﺣل‬‫اﻟﺳﺣﺎﺑﺔ‬‫ﻟﺗﻘدﯾم‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬،‫ﯾﻣﻛن‬‫أن‬‫ﯾطﻠق‬‫ﻋﻠﯾﮫ‬‫ﺟدار‬
‫ﺣﻣﺎﯾﺔ‬‫اﻟﺳﺣﺎﺑﺔ‬،‫أو‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﻛﺧدﻣﺔ‬Firewall as a)FAAS(
service‫ﯾﻌﺗﺑر‬‫اﻟﻌدﯾد‬‫ﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﺳﺣﺎﺑﯾﺔ‬ً‫ﺎ‬‫ﻣرادﻓ‬‫ﻟﺟدران‬‫ﺣﻣﺎﯾﺔ‬‫اﻟوﻛﯾل‬
‫ﻣن‬‫ﻗﺑل‬‫اﻟﻛﺛﯾر‬،‫ا‬ً‫ﻧظر‬‫ﻷن‬‫ﺧﺎدم‬‫اﻟﺳﺣﺎﺑﺔ‬‫ﺎ‬ً‫ﺑ‬‫ﻏﺎﻟ‬‫ﻣﺎ‬‫ﯾﺳﺗﺧدم‬‫ﻓﻲ‬‫إﻋداد‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬
‫اﻟوﻛﯾل‬)‫ﻋﻠﻰ‬‫اﻟرﻏم‬‫ﻣن‬‫أﻧﮫ‬‫ﻻ‬‫ﯾﺟب‬‫ﺑﺎﻟﺿرورة‬‫أن‬‫ﯾﻛون‬‫اﻟوﻛﯾل‬‫ﻋﻠﻰ‬‫اﻟﺳﺣﺎﺑﺔ‬،
‫ﻓﺈﻧﮫ‬‫ﻓﻲ‬‫ﻛﺛﯾر‬‫ﻣن‬‫اﻷﺣﯾﺎن‬(
‫إن‬‫اﻟﻔﺎﺋدة‬‫اﻟﻛﺑﯾرة‬‫ﻻﻣﺗﻼك‬‫ﺟدران‬‫ﺣﻣﺎﯾﺔ‬‫ﻣﺳﺗﻧدة‬‫إﻟﻰ‬‫اﻟﺳﺣﺎﺑﺔ‬‫ھﻲ‬‫ﺳﮭوﻟﺔ‬‫ﻗﯾﺎﺳﮭﺎ‬‫ﻣﻊ‬
‫ﻣؤﺳﺳﺗك‬.‫ﻣﻊ‬‫ﻧﻣو‬‫اﺣﺗﯾﺎﺟﺎﺗك‬،‫ﯾﻣﻛﻧك‬‫إﺿﺎﻓﺔ‬‫ﺳﻌﺔ‬‫إﺿﺎﻓﯾﺔ‬‫إﻟﻰ‬‫ﺧﺎدم‬‫اﻟﺳﺣﺎﺑﺔ‬
‫ﻟﺗﺻﻔﯾﺔ‬‫أﺣﻣﺎل‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫اﻷﻛﺑر‬.‫ﺗﺗﻔوق‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﺳﺣﺎﺑﯾﺔ‬،‫ﻣﺛل‬
‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﺎدﯾﺔ‬،‫ﻋﻠﻰ‬‫أﻣﺎن‬‫اﻟﻣﺣﯾط‬
‫ﻛﯾﻔﯾﺔ‬‫اﺧﺗﯾﺎر‬‫اﻟﻧوع‬‫اﻟﺻﺣﯾﺢ‬‫ﻣن‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬
‫إن‬‫اﺧﺗﯾﺎر‬‫اﻟﻧوع‬‫اﻟﺻﺣﯾﺢ‬‫ﻣن‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﯾﻌﻧﻲ‬‫اﻹﺟﺎﺑﺔ‬‫ﻋﻠﻰ‬‫اﻷﺳﺋﻠﺔ‬‫ﺣول‬‫ﻣﺎ‬‫ھو‬
‫اﻟﻣﻘﺻود‬‫ﺑﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬،‫وﻛﯾف‬‫ﺳﯾﺗم‬‫اﺳﺗﺧداﻣﮫ‬،‫وﻣﺎ‬‫اﻟذي‬‫ﯾﮭدف‬‫إﻟﻰ‬‫ﺣﻣﺎﯾﺗﮫ‬‫وأي‬‫ﻋدد‬
‫ﻣن‬‫اﻷﺳﺋﻠﺔ‬‫اﻟﻌﺎﻣﺔ‬‫ﺣول‬‫اﻟﺑﻧﯾﺔ‬‫اﻟﺗﺣﺗﯾﺔ‬‫اﻟﺗﻲ‬‫ﯾﮭدف‬‫إﻟﻰ‬‫ﺣﻣﺎﯾﺗﮭﺎ‬.‫ﺳﯾﺧﺗﻠف‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬
‫اﻟﺻﺣﯾﺢ‬‫ﻟﻠﻣؤﺳﺳﺎت‬‫اﻟﻣﺧﺗﻠﻔﺔ‬‫ﺑﺷﻛل‬‫ﺛﺎﺑت‬‫ﺎ‬ً‫ﺑ‬‫ﺗﻘرﯾ‬‫ﻣن‬‫واﺣدة‬‫إﻟﻰ‬‫أﺧرى‬،‫ﺣﯾث‬‫أن‬‫ﻛل‬
‫ﺷﺑﻛﺔ‬‫ﺧﺎﺻﺔ‬‫ﻓرﯾدة‬‫وﻟﮭﺎ‬‫ﻣﺗطﻠﺑﺎﺗﮭﺎ‬‫اﻟﻔرﯾدة‬.
‫ﺑﻐض‬‫اﻟﻧظر‬‫ﻋن‬‫أﻧواع‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﺗﻲ‬‫ﺗﺧﺗﺎرھﺎ‬،‫ﺿﻊ‬‫ﻓﻲ‬‫اﻋﺗﺑﺎرك‬‫أن‬‫ﺟدار‬
‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟذي‬‫ﺗﻣت‬‫ﺗﮭﯾﺋﺗﮫ‬‫ﺑﺷﻛل‬‫ﺧﺎطﺊ‬‫ﯾﻣﻛن‬،‫ﻣن‬‫ﺑﻌض‬‫اﻟﻧواﺣﻲ‬،‫أن‬‫ﯾﻛون‬‫أﺳوأ‬‫ﻣن‬
‫ﻋدم‬‫وﺟود‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﻋﻠﻰ‬‫اﻹطﻼق‬‫ﻷﻧﮫ‬‫ﯾﻌطﻲ‬‫ﺎ‬ً‫ﻋ‬‫اﻧطﺑﺎ‬‫ا‬ً‫ﺧطﯾر‬‫ﺑﺎﻷﻣﺎن‬،‫ﻣﻊ‬‫ﺗوﻓﯾر‬
‫اﻟﻘﻠﯾل‬‫أو‬‫ﻻ‬‫ﺷﻲء‬.
‫ﻓﻠذﻟك‬،‫ﻣﺎ‬‫ھﻲ‬‫ھﻧدﺳﺔ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﻧﺎﺳﺑﺔ‬‫ﻟﺷرﻛﺗك؟‬
‫ﺗﺻﻔﯾﺔ‬‫اﻟﺣزم‬‫اﻟﺑﺳﯾطﺔ‬‫أو‬‫اﻟﺑواﺑﺔ‬‫ﻋﻠﻰ‬‫ﻣﺳﺗوى‬‫اﻟداﺋرة‬،‫واﻟﺗﻲ‬‫ﺗوﻓر‬‫ﺣﻣﺎﯾﺔ‬‫أﺳﺎﺳﯾﺔ‬‫ﺑﺄﻗل‬
‫ﺗﺄﺛﯾر‬‫ﻋﻠﻰ‬‫اﻷداء؟‬‫ﺑﻧﯾﺔ‬‫اﻟﻔﺣص‬‫ذات‬‫اﻟﺣﺎﻟﺔ‬‫اﻟﺗﻲ‬‫ﺗﺟﻣﻊ‬‫ﺑﯾن‬‫إﻣﻛﺎﻧﺎت‬‫اﻟﺧﯾﺎرﯾن‬‫اﻟﺳﺎﺑﻘﯾن‬،
‫وﻟﻛن‬‫ﻟﮭﺎ‬‫ﺗﺄﺛﯾر‬‫أﻛﺑر‬‫ﻋﻠﻰ‬‫اﻷداء؟‬‫أوﺧﺎدم‬‫وﻛﯾل‬‫أو‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﻣن‬‫اﻟﺟﯾل‬‫اﻟﺗﺎﻟﻲ‬‫ﯾوﻓر‬
‫ﺣﻣﺎﯾﺔ‬‫أﻗوى‬‫ﺑﻛﺛﯾر‬‫ﻣﻘﺎﺑل‬‫ﻧﻔﻘﺎت‬‫إﺿﺎﻓﯾﺔ‬‫وﺗﺄﺛﯾر‬‫أداء‬‫أﻋﻠﻰ؟‬
‫اﻟﺳؤال‬‫اﻟﺣﻘﯾﻘﻲ‬‫ھو‬"‫ﻟﻣﺎذا‬‫ﺗﺳﺗﺧدم‬‫واﺣد‬‫ﻓﻘط؟‬"
‫ﻻ‬‫ﺗوﺟد‬‫طﺑﻘﺔ‬‫ﺣﻣﺎﯾﺔ‬‫واﺣدة‬،‫ﻣﮭﻣﺎ‬‫ﻛﺎﻧت‬‫ﻗوﯾﺔ‬،‫ﺳﺗﻛون‬‫ﻛﺎﻓﯾﺔ‬‫ﻟﺣﻣﺎﯾﺔ‬‫ﻋﻣﻠك‬.‫ﻟﺗوﻓﯾر‬
‫ﺣﻣﺎﯾﺔ‬‫أﻓﺿل‬،‫ﯾﺟب‬‫أن‬‫ﺗﺣﺗوي‬‫ﺷﺑﻛﺎﺗك‬‫ﻋﻠﻰ‬‫طﺑﻘﺎت‬‫ﻣﺗﻌددة‬‫ﻣن‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬،‫ﻓﻲ‬
‫اﻟﻣﺣﯾط‬‫وﻓﺻل‬‫اﻷﺻول‬‫اﻟﻣﺧﺗﻠﻔﺔ‬‫ﻋﻠﻰ‬‫ﺷﺑﻛﺗك‬.‫ﻋﻠﻰ‬‫ﺳﺑﯾل‬‫اﻟﻣﺛﺎل‬،‫ﯾﻣﻛن‬‫أن‬‫ﯾﻛون‬‫ﻟدﯾك‬
‫ﺟﮭﺎز‬‫أو‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫ﺳﺣﺎﺑﻲ‬‫ﻓﻲ‬‫ﻣﺣﯾط‬‫ﺷﺑﻛﺗك‬،‫ﺛم‬‫ﺟدران‬‫ﺣﻣﺎﯾﺔ‬‫ﺑراﻣﺞ‬‫ﻓردﯾﺔ‬‫ﻋﻠﻰ‬‫ﻛل‬
‫ﻣن‬‫أﺻول‬‫اﻟﺷﺑﻛﺔ‬‫اﻟﺧﺎﺻﺔ‬‫ﺑك‬.
‫ﯾﺳﺎﻋد‬‫وﺟود‬‫ﺟدران‬‫ﺣﻣﺎﯾﺔ‬‫إﺿﺎﻓﯾﺔ‬‫ﻋﻠﻰ‬‫ﺟﻌل‬‫ﺷﺑﻛﺗك‬‫أﻛﺛر‬‫ﺻﻌوﺑﺔ‬‫ﻓﻲ‬‫اﻻﺧﺗراق‬‫ﻣن‬
‫ﺧﻼل‬‫إﻧﺷﺎء‬‫دﻓﺎع‬‫إﺿﺎﻓﻲ‬‫ﻣﺗﻌﻣق‬‫ﯾﻌزل‬‫اﻷﺻول‬‫اﻟﻣﺧﺗﻠﻔﺔ‬-‫ﻣﻣﺎ‬‫ﯾﺟﻌل‬‫اﻟﻣﮭﺎﺟﻣﯾن‬
‫ﯾﺿطرون‬‫إﻟﻰ‬‫اﻟﻘﯾﺎم‬‫ﺑﻌﻣل‬‫إﺿﺎﻓﻲ‬‫ﻟﻠوﺻول‬‫إﻟﻰ‬‫ﺟﻣﯾﻊ‬‫ﻣﻌﻠوﻣﺎﺗك‬‫اﻟﺣﺳﺎﺳﺔ‬.
‫ﺳﺗﻌﺗﻣد‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﻌﯾﻧﺔ‬‫اﻟﺗﻲ‬‫ﺗرﯾد‬‫اﺳﺗﺧداﻣﮭﺎ‬‫ﻋﻠﻰ‬‫ﻗدرات‬‫ﺷﺑﻛﺗك‬‫وﻣﺗطﻠﺑﺎت‬
‫اﻻﻣﺗﺛﺎل‬‫ذات‬‫اﻟﺻﻠﺔ‬‫ﺑﺻﻧﺎﻋﺗك‬‫واﻟﻣوارد‬‫اﻟﻣﺗوﻓرة‬‫ﻟدﯾك‬‫ﻹدارة‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬‫ھذه‬.
‫ھل‬‫ﺗﺣﺗﺎج‬‫إﻟﻰ‬‫ﻣﺳﺎﻋدة‬‫ﻓﻲ‬‫اﻟﻌﺛور‬‫ﻋﻠﻰ‬‫ﺑﻧﯾﺔ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻣﺛﺎﻟﯾﺔ‬‫ﻻﺣﺗﯾﺎﺟﺎت‬‫ﻋﻣﻠك؟‬‫ﻓﻛر‬
‫ﻓﻲ‬‫اﻟﺑدء‬‫ﺑﺗدﻗﯾق‬‫وﺗﻘﯾﯾم‬‫ﺳﯾﺎﺳﺔ‬‫اﻷﻣﺎن‬ً‫ﻻ‬‫أو‬.‫ﯾﻣﻛن‬‫أن‬‫ﯾﺳﺎﻋدك‬‫ھذا‬‫ﻓﻲ‬‫ﺗﺣدﯾد‬‫ﺟﻣﯾﻊ‬
‫اﻷﺻول‬‫اﻟﻣوﺟودة‬‫ﻋﻠﻰ‬‫اﻟﺷﺑﻛﺔ‬‫واﻟﺗﻲ‬‫ﺗﺣﺗﺎج‬‫إﻟﻰ‬‫ﺣﻣﺎﯾﺔ‬‫ﺣﺗﻰ‬‫ﺗﺗﻣﻛن‬‫ﻣن‬‫ﺗﺣﺳﯾن‬‫ﺗﻧﻔﯾذ‬
‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺑﺷﻛل‬‫أﻓﺿل‬.
II.‫ﻟل‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻣن‬ ‫ﻛﻼ‬Windows‫ال‬ ‫ﻣن‬ ‫ﯾﻌﺗﺑر‬ ‫اﻟﺧﺎرﺟﻲ‬ ‫واﻟﺟدار‬Software
Firewall
‫ان‬ ‫اﻟﻔرق‬ ‫و‬‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬‫اﻟﺧﺎص‬‫ب‬Windows‫ﺑﺷﻛل‬ ‫ﺑﺎﻟﻣﮭﻣﺔ‬ ‫ﯾﻘوم‬‫ﻣﺣﺗرف‬‫ﻋن‬
‫طرﯾق‬‫ﺻﻣت‬ ‫ﻓﻲ‬ ‫واﻟﺻﺎدرة‬ ‫اﻟواردة‬ ‫اﻟﻣﻌﻠوﻣﺎت‬ ‫ﺣرﻛﺔ‬ ‫وﻣراﻗﺑﺔ‬ ‫اﻟواردة‬ ‫اﻻﺗﺻﺎﻻت‬ ‫ﺣﺟب‬
‫ﻣن‬ ‫وﯾﺳﺄﻟك‬ ‫ﻓﯾﮭﺎ‬ ‫ﻣوﺛوق‬ ‫اﻟﻐﯾر‬ ‫اﻻﺗﺻﺎﻻت‬ ‫ﻣﺑﺎﺷر‬ ‫ﺑﺷﻛل‬ ‫ﯾراﻗب‬ ‫ﻓـﮭو‬ .‫ﯾﻧﺑﮭك‬ ‫أن‬ ‫وﺑدون‬
‫ﺑﻌض‬ ‫ﻓﻲ‬ ‫اﺷﻌﺎر‬ ‫ﺧﻼل‬‫داﺋﻣﺎ‬ ‫ﻟﯾس‬ ‫اﻷﺣﯾﺎن‬
‫أﻣﺎ‬‫اﻟﺧﺎرﺟﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺑرﻧﺎﻣﺞ‬‫اﻟﻔﯾروﺳﺎت‬ ‫ﻣﺿﺎد‬)Antivirus(‫ﻋن‬ ‫ﻋﺑﺎرة‬ ‫ھو‬ ‫اﻟذي‬
‫ﺑرﻧﺎﻣﺞ‬‫ﺑﺗﺣﻣﯾﻠﮭﺎ‬ ‫اﻟﻣﺳﺗﺧدم‬ ‫ﯾﻘوم‬‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺑرﻧﺎﻣﺞ‬ ‫ﻣﻊ‬ ‫اواﻟﻣرﻓق‬‫ﺑﺎل‬ ‫اﻟﺧﺎص‬Windows
‫ﻓﯾﻘوم‬‫اذﻧك‬ ‫وﯾطﻠب‬ ‫ﯾﻔﻌل‬ ‫ﺑﻣﺎ‬ ‫ﺑﺎﺷﻌﺎرك‬‫ﻓﻲ‬‫اﻟﺟﮭﺎز‬ ‫ﻋﻠﻲ‬ ‫ﺑﺈﺿﺎﻓﺗﮫ‬ ‫اﻟﻣﺳﺗﺧدم‬ ‫وﯾﻘوم‬ ‫اﻷﻣور‬
‫ﻣﺛل‬
omodo	FirewallC‫و‬Zone Alarm firewall
‫اﻧﮫ‬ ‫اﻟﻌﻠم‬ ‫ﻣﻊ‬‫ﯾﻣﻛﻧك‬‫ال‬ ‫ف‬ ‫اﻻﻓﺗراﺿﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫إﯾﻘﺎف‬Windows‫ﻣن‬ ‫اﻟﺗﺄﻛد‬ ‫او‬
‫اﺧﺗﯾﺎر‬ ‫ﺧﻼل‬ ‫ﻣن‬ ‫ﻋﻣﻠﮫ‬FirewallWindows‫ﻣن‬PanelControl
ü‫اﻟﻔﯾروﺳﺎت‬ ‫ﻣﺿﺎد‬)Antivirus(‫اﻟطرﯾﻘﺔ‬‫اﻟﺗﻲ‬‫ﯾﻧﻔذ‬‫ﺑﮭﺎ‬3‫إﺟراءات‬‫و‬‫ھﻲ‬
‫ﻛﺷف‬Detection،‫اﻟﺗﻌرف‬Identification،‫إزاﻟﺔ‬Remove
‫ﯾﺗﻌﺎﻣل‬‫ﺑرﻧﺎﻣﺞ‬‫ﻣﻛﺎﻓﺣﺔ‬‫اﻟﻔﯾروﺳﺎت‬‫ﻣﻊ‬‫اﻟﺗﮭدﯾدات‬‫اﻟﺧﺎرﺟﯾﺔ‬‫واﻟﺗﮭدﯾدات‬‫اﻟداﺧﻠﯾﺔ‬.‫ﯾﺗم‬‫ﺗﻧﻔﯾذه‬
‫ﻓﻘط‬‫اﻟﺑرﻣﺟﯾﺎت‬‫ﻟﯾﺳت‬‫ﻓﻲ‬‫اﻷﺟﮭزة‬‫أﯾﺿﺎ‬.
III.‫ﻟل‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﯾﻧﻘﺳم‬Windows‫ﻗﺳﻣﯾن‬ ‫اﻟﻲ‬
I.‫ﺟدار‬	‫اﻟﺣﻣﺎﯾﺔ‬	‫ﻟﺷﺑﻛﺎت‬	‫اﻻﺗﺻﺎل‬		
	
‫اﻟﻼﺳﻠﻛﯾﺔ‬ ‫ﺑﺎﻟﺷﺑﻛﺔ‬ ‫اﻻﺗﺻﺎل‬ ‫ﻋﻧد‬Fi-Wi‫ﺟدار‬ ‫ﻓﺈن‬‫ﺧﯾﺎرات‬ ‫ﺛﻼﺛﺔ‬ ‫ﻟك‬ ‫ﺳﯾﻌرض‬ ‫اﻟﺣﻣﺎﯾﺔ‬
§‫ﻣﻧزﻟﯾﺔ‬ ‫ﺷﺑﻛﺔ‬Home Network
‫واﺿﺢ‬‫ﻣن‬‫اﺳﻣﮭﺎ‬‫ان‬‫اﻟﻌﻣل‬‫ﻋﻠﻰ‬‫ھذه‬‫اﻟﺷﺑﻛﺔ‬‫ﺳﯾﻛون‬‫ﻟﻠﻣﻧزل‬‫وﺑﺎﻟﺗﺎﻟﻲ‬‫ﻋﻧد‬‫اﺧﺗﯾﺎرھﺎ‬‫ﻓﺈﻧﮫ‬
‫ﺑﺎﻻﻣﻛﺎن‬‫ﻣﺷﺎرﻛﺔ‬‫اﻟﺻور‬‫واﻟﻔﯾدﯾو‬‫واﻟطﺎﺑﻌﺎت‬‫واﻟﻣﺳﺗﻧدات‬‫ﻣﻊ‬‫اﺟﮭزة‬‫اﻟﻛﻣﺑﯾوﺗر‬‫اﻟﻣﺗﺻﻠﺔ‬‫ﺑﮭذه‬
‫اﻟﺷﺑﻛﺔ‬‫وﺗﻌﺗﺑر‬‫ھذه‬‫اﻟﺷﺑﻛﺔ‬‫آﻣﻧﺔ‬‫ﺑﺎﻟﻧﺳﺑﺔ‬‫ﻟﻼﺟﮭزة‬‫اﻟﻣﻧزﻟﯾﺔ‬.
§‫اﻟﻌﻣل‬ ‫ﺷﺑﻛﺔ‬Work Network
‫ﻋﺑر‬ ‫واﻟﻣﺳﺗﻧدات‬ ‫واﻟﻔﯾدﯾو‬ ‫واﻟﺻور‬ ‫اﻟﻣﻠﻔﺎت‬ ‫ﻣﺷﺎرﻛﺔ‬ ‫ﯾﻣﻛﻧك‬ (‫ﻣﻧزﻟﯾﺔ‬ ‫)ﺷﺑﻛﺔ‬ ‫ﻛﺳﺎﺑﻘﺗﮭﺎ‬ ً‫ﺎ‬‫ﺗﻘرﯾﺑ‬
‫ﺑﮭﺎ‬ ‫اﻟﻣﺗﺻﻠﺔ‬ ‫ﺑﺎﻻﺟﮭزة‬ ‫اﻟﺷﺑﻛﺔ‬ ‫ھذه‬.
§‫ﻋﺎﻣﺔ‬ ‫ﺷﺑﻛﺔ‬Public Network
‫ھذا‬ ‫اﺳﺗﺧدام‬ ‫ﺣﺎول‬ ‫ﻟذﻟك‬ ، ‫اﻟﺧطورة‬ ‫ﻋﺎﻟﻲ‬ ‫اﻟﺷﺑﻛﺎت‬ ‫ﻣن‬ ‫اﻟﻧوع‬ ‫ھذا‬ ‫ﯾﻌﺗﺑر‬‫اﻟﺷﺑﻛﺎت‬ ‫ﻣن‬ ‫اﻟﻧﻣط‬
‫ﻻﺳﻠﻛﯾﺔ‬ ‫ﺷﺑﻛﺔ‬ ‫وﺗﺳﺗﺧدم‬ ‫وذﻟك‬ ‫اﻟﺧﺎرج‬ ‫ﻓﻲ‬ ‫ﻛﻧت‬ ‫اذا‬WIFI‫اﻟﺷﺑﻛﺎت‬ ‫ﻣن‬ ‫ﻧوع‬ ‫اﻧﺳب‬ ‫ھو‬ ‫ﻓﮭذا‬
‫اﻟﻌﺎﻣﺔ‬ ‫واﻻﻣﺎﻛن‬ ‫واﻟﻣﻘﺎھﻲ‬ ‫اﻟﻣطﺎرات‬ ‫ﻓﻲ‬ ً‫ﺎ‬‫ﺧﺻوﺻ‬.
‫اﻟﻣﻧزﻟﯾﺔ‬ ‫اﻟﺷﺑﻛﺔ‬ ‫ﻣن‬ ‫ﻛل‬ ‫أن‬ ‫اﻟﻌﻠم‬ ‫ﻣﻊ‬ ، ‫اﻟﺷﺑﻛﺎت‬ ‫ﺗﻠك‬ ‫ﻓﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺗﻔﻌﯾل/ﺗﻌطﯾل‬ ‫ﺑﺎﻻﻣﻛﺎن‬
‫و‬‫ﺧﺎﺻﺔ‬ ‫)ﺷﺑﻛﺎت‬ ‫ﺗﻌﺗﺑر‬ ‫اﻟﻌﻣل‬ ‫ﺷﺑﻛﺔ‬(
‫اﻟﺑﻌض‬ ‫ﺑﺑﻌﺿﮭﺎ‬ ‫ﻣرﺗﺑطﺔ‬ ‫ﺳﺗﻛون‬ ‫ﻓﯾﮭﺎ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫اﻋدادت‬ ‫ﻓﺈن‬ ‫وﺑﺎﻟﺗﺎﻟﻲ‬‫أن‬ ‫اﻟﻌﻠم‬ ‫ﻣﻊ‬‫ﺗﺷﻐﯾل‬
‫ﻋﻠﯾك‬ ‫ﯾﻌﺗﻣد‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫واﯾﻘﺎف‬	.	
II.‫ﺟدار‬‫اﻟ‬‫ﻟﻠﺑراﻣﺞ‬ ‫ﺣﻣﺎﯾﺔ‬‫واﻷﻟﻌﺎب‬
‫ﻟﺗﻌﻣل‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻣن‬ (‫)اﺳﺗﺛﻧﺎء‬ ‫ﺗﺻرﯾﺢ‬ ‫ﺗﺗطﻠب‬ ‫اﻟﺗﻲ‬ ‫اﻷﻟﻌﺎب‬ ‫أو‬ ‫اﻟﺑراﻣﺞ‬ ‫ﺑﻌض‬ ‫ھﻧﺎك‬
‫رﺳﺎﻟﺔ‬ ‫ﻟك‬ ‫ﺳﺗظﮭر‬ ‫ﻟذﻟك‬ ‫وﺳﻠﯾم‬ ‫ﺻﺣﯾﺢ‬ ‫ﺑﺷﻛل‬‫ﻋدﻣﮫ‬ ‫ﻣن‬ ‫ﺑﺎﻟﺳﻣﺎح‬ ‫ﺗﻔﯾدك‬.
‫ﻓﺑﺈﻣﻛﺎﻧك‬‫ﺟدار‬ ‫ﻋﺑر‬ ‫ﺗﺻرﯾﺢ‬ ‫او‬ ‫اﺳﺗﺛﻧﺎء‬ ‫واﻷﻟﻌﺎب‬ ‫اﻟﺑراﻣﺞ‬ ‫ﻣﻧﺢ‬ ‫ﻓﻲ‬ ‫اﻟﺗﺣﻛم‬	‫اﻟﺣﻣﺎﯾﺔ‬.
IV.‫ﻓﮭل‬‫ﺟدار‬ ‫اﻟﻲ‬ ‫ﺑﺣﺎﺟﺔ‬ ً‫ﺎ‬‫ﺣﻘ‬ ‫اﻧت‬‫ﺧﺎرﺟﻲ‬‫ﺟدا‬ ‫ﻣن‬ ً‫ﻻ‬‫ﺑد‬ ‫ﺣﻣﺎﯾﺔ‬‫ر‬‫ﺣﻣﺎﯾﺔ‬‫ال‬Windows.
‫ﺑﺎل‬ ‫اﻟﺧﺎص‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬Windows‫ﺑﺷﻛل‬ ‫اﻟوارده‬ ‫اﻻﺗﺻﺎﻻت‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺑﻣﮭﻣﺔ‬ ‫وﯾﻘوم‬ ‫ﻣﻣﯾز‬
‫ظﺎھرة‬ ‫ﻏﯾر‬ ً‫ﺎ‬‫ﻏﺎﻟﺑ‬ ‫وﻟﻛﻧﮭﺎ‬ ‫ﻣﺗﻘدﻣﺔ‬ ‫ﺧواص‬ ‫ﻋﻠﻰ‬ ً‫ﺎ‬‫اﯾﺿ‬ ‫وﯾﺣﺗوي‬ ، ‫راﺋﻊ‬.‫وﺗﻠﻘﺎﺋﯾﺔ‬
‫ﺟﮭﺎزك‬ ‫ﻋﻠﻰ‬ ‫اﻟﺑراﻣﺞ‬ ‫ﻋﻣل‬ ‫ﻓﻲ‬ ‫اﻟﺗﺣﻛم‬ ‫ﻓﻲ‬ ‫ﺑﺳﮭوﻟﺔ‬ ‫ﻟك‬ ‫ﻓﺗﺳﻣﺢ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺑراﻣﺞ‬ ‫اﻣﺎ‬
‫اﻟﺣﺟ‬ ‫ﺳواء‬ ‫ﺗﻔﻌل‬ ‫ان‬ ‫ﺗرﯾد‬ ‫ﺑﻣﺎ‬ ‫اﺷﻌﺎر‬ ‫ﻟك‬ ‫ﯾظﮭر‬ ‫ﺣﯾث‬ .‫ﺑﺎﻻﻧﺗرﻧت‬ ‫واﺗﺻﺎﻟﮭﺎ‬‫وھﻧﺎ‬ .‫اﻟﺳﻣﺎح‬ ‫او‬ ‫ب‬
‫اﺳﮭل‬ ‫اﻟﺗﺣﻛم‬ ‫ﯾﻛون‬.‫ﻟﻠﺟﻣﯾﻊ‬ ‫ﺑﺎﻟﻧﺳﺑﺔ‬ ‫اﻟﺗﺣﻛم‬ ‫ﺳﮭﻠﺔ‬ ‫ﻟﯾﺳت‬ ‫وﻟﻛن‬
V.‫ﻣﺗﻘدﻣﯾن‬ ‫ﻣﺳﺗﺧدﻣﯾن‬ ‫ﯾﺣﺗﺎج‬ ‫ﺧﺎرﺟﻲ‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫اﺳﺗﺧدام‬‫ﺑﻌض‬ ‫ھﻧﺎك‬ ‫أن‬ ‫ﺣﯾث‬ ً‫ﻼ‬‫ﻗﻠﯾ‬
‫او‬ ‫ھﺎم‬ ‫اﺗﺻﺎل‬ ‫ﺗﺣﺟب‬ ‫ﻓرﺑﻣﺎ‬ ‫ﺑﮭﺎ‬ ‫ﻋﻠم‬ ‫ﻋﻠﻰ‬ ‫ﺗﻛن‬ ‫ﻟم‬ ‫واذا‬ ‫ﻣﻧك‬ ‫اذن‬ ‫ﺳﺗطﻠب‬ ‫اﻟﺗﻲ‬ ‫اﻟﻌﻣﻠﯾﺎت‬
‫ﺧطر‬ ‫ﺑﺎﺗﺻﺎل‬ ‫ﺗﺳﻣﺢ‬.
‫وﻛذﻟك‬ً‫ﺎ‬‫ﻏﺎﻟﺑ‬‫ﻣﺎ‬‫ﺑﺎﺳﺗﺧدام‬ ‫ﺳﺗﻘوم‬ ‫ھﻧﺎ‬ ‫ﻻﻧك‬ ‫ﺑك‬ ‫اﻟﺧﺎص‬ ‫اﻟﻛﻣﺑﯾوﺗر‬ ‫ﺟﮭﺎز‬ ‫ﻓﻲ‬ ‫ﺑطﺊ‬ ‫ﺗﺳﺑب‬
‫ﻛﻧت‬ ‫ان‬ ‫اﻻ‬ ‫ﺟﮭﺎزك‬ ‫ﻟﻣوارد‬ ‫اﺳﺗﮭﻼك‬ ‫وﺑذﻟك‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫اﺧر‬ ‫ﺑرﻧﺎﻣﺞ‬ ً‫ﺎ‬‫واﯾﺿ‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺑرﻧﺎﻣﺞ‬
‫ك‬ ً‫ﺎ‬‫ﻧﺳﺑﯾ‬ ‫ﺟﯾدة‬ ‫ﺑﺎﻣﻛﺎﻧﯾﺎت‬ ‫ﺟﮭﺎز‬ ‫ﺗﻣﺗﻠك‬Ram‫و‬ ‫ﻣﻣﯾز‬Processor‫ﺟدار‬ ‫ﻓﺑرﻧﺎﻣﺞ‬ .‫اﻓﺿل‬
‫ﻣ‬ ‫ﺑﺷﻛل‬ ‫ﺟﮭﺎزك‬ ‫ﻋﻠﻲ‬ ‫ﯾﻌﻣل‬ ‫ﺑرﻧﺎﻣﺞ‬ ‫ھو‬ ‫اﻟﺣﻣﺎﯾﺔ‬‫ﺟﯾدة‬ ‫اﻟﺟﮭﺎز‬ ‫اﻣﻛﺎﻧﯾﺎت‬ ‫ﺗﻛن‬ ‫ﻟم‬ ‫ان‬ ‫ﻟذﻟك‬ ‫ﺗواﺻل‬
‫اﻟﺟﮭﺎز‬ ‫ﺑطﺊ‬ ‫ﻣﺷﺎﻛل‬ ‫ﺳﺗﺣدث‬ ‫ﻓﮭﻧﺎ‬.
‫ﻓﻠذﻟك‬‫ال‬ ‫ﺣﻣﺎﯾﺔ‬ ‫وﺟدار‬ ‫اﻟﯾﮫ‬ ‫ﺑﺣﺎﺟﺔ‬ ‫ﻟﯾﺳوا‬ ‫اﻟﻣﺳﺗﺧدﻣﯾن‬ ‫اﻏﻠب‬Windows‫ﻓﻲ‬ ‫اﻻ‬ .‫ﻛﺎﻓﻲ‬
‫ﻧﺳﺧﺔ‬ ‫اﺳﺗﺧدام‬ ‫ﺣﺎﻟﺔ‬Windows‫اﻛﺑر‬ ‫اﻟﻣﺧﺎطر‬ ‫ﺗﺻﺑﺢ‬ ‫وھﻧﺎ‬ ‫ﻣﺣدﺛﺔ‬ ‫وﻏﯾر‬ ‫اﺻﻠﯾﺔ‬ ‫ﻏﯾر‬
‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻟدﯾك‬ ‫ﯾﻛون‬ ‫أن‬ ‫ﯾﺟب‬ ‫وھﻧﺎ‬ ‫اﻣﻧﯾﺔ‬ ‫ﺗﺣدﯾﺛﺎت‬ ‫ﻋﻠﻰ‬ ‫ﯾﺣﺻل‬ ‫ﻻ‬ ‫ﺟﮭﺎزك‬ ‫أن‬ ‫ﺣﯾث‬
‫ﺧﺎرﺟﻲ‬.
VI.‫اﻟﻔﯾروس‬‫ھو‬‫ﺟزء‬‫ﻣن‬‫اﻟﺗﻌﻠﯾﻣﺎت‬‫اﻟﺑرﻣﺟﯾﺔ‬‫اﻟﻣﺿﻣﻧﺔ‬‫ﻓﻲ‬‫اﻟﺑرﻧﺎﻣﺞ‬.
‫اﻟﻔﯾروﺳﺎت‬‫ذاﺗﯾﺔ‬‫اﻟﻧﺳﺦ‬‫وﻣﺻﻣﻣﺔ‬‫ﻹﺻﺎﺑﺔ‬‫اﻟﺑراﻣﺞ‬‫اﻷﺧرى‬.‫ﯾﻣﻛﻧﮭم‬‫إﺣداث‬‫ﻓوﺿﻰ‬
‫ﻓﻲ‬‫اﻟﻧظﺎم‬‫ﻋن‬‫طرﯾق‬‫ﺗﻌدﯾل‬‫أو‬‫إﺗﻼف‬‫اﻟﻣﻠﻔﺎت‬‫اﻟﺗﻲ‬‫ﺗﺗﺳﺑب‬‫ﻓﻲ‬‫ﺗﻌطل‬‫اﻟﻧظﺎم‬‫وأﻋطﺎل‬
‫اﻟﺑرﻧﺎﻣﺞ‬.‫ﻋﻧد‬‫اﻟوﺻول‬‫إﻟﻰ‬‫اﻟﺟﮭﺎز‬‫اﻟﻣﺳﺗﮭدف‬،‫ﯾدﺧل‬‫ﻗطﺎرة‬‫ﻓﯾروس‬)‫ﻋﺎدة‬‫ﺣﺻﺎن‬
‫طروادة‬(‫اﻟﻔﯾروس‬‫ﻓﻲ‬‫اﻟﻧظﺎم‬.
ü‫أﻧواع‬‫ﻣﺧﺗﻠﻔﺔ‬‫ﻣن‬‫اﻟﻔﯾروﺳﺎت‬:
§‫اﻟﻣﻠﻔﺎت‬ ‫ﻓﯾرس‬File Virus
‫ﯾﺻﯾب‬‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬‫اﻟﻔﯾروﺳﺎت‬‫اﻟﻧظﺎم‬‫ﻣن‬‫ﺧﻼل‬‫إﻟﺣﺎق‬‫ﻧﻔﺳﮫ‬‫ﺑﻧﮭﺎﯾﺔ‬‫اﻟﻣﻠف‬.
‫ﯾﻘوم‬‫ﺑﺗﻐﯾﯾر‬‫ﺑداﯾﺔ‬‫اﻟﺑرﻧﺎﻣﺞ‬‫ﺑﺣﯾث‬‫ﯾﻧﺗﻘل‬‫ﻋﻧﺻر‬‫اﻟﺗﺣﻛم‬‫إﻟﻰ‬‫اﻟﺗﻌﻠﯾﻣﺎت‬
‫اﻟﺑرﻣﺟﯾﺔ‬‫اﻟﺧﺎﺻﺔ‬‫ﺑﮫ‬.‫ﺑﻌد‬‫ﺗﻧﻔﯾذ‬‫اﻟﺗﻌﻠﯾﻣﺎت‬‫اﻟﺑرﻣﺟﯾﺔ‬‫اﻟﺧﺎﺻﺔ‬‫ﺑﮫ‬،‫ﯾﻌود‬
‫ﻋﻧﺻر‬‫اﻟﺗﺣﻛم‬‫إﻟﻰ‬‫اﻟﺑرﻧﺎﻣﺞ‬‫اﻟرﺋﯾﺳﻲ‬.‫ﻟم‬‫ﯾﻼﺣظ‬‫ﺗﻧﻔﯾذه‬‫ﺣﺗﻰ‬.‫ﯾطﻠق‬‫ﻋﻠﯾﮫ‬
‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﻓﯾروس‬‫طﻔﯾﻠﻲ‬‫ﻷﻧﮫ‬‫ﻻ‬‫ﯾﺗرك‬‫أي‬‫ﻣﻠف‬‫ﺎ‬ً‫ﻣ‬‫ﺳﻠﯾ‬‫وﻟﻛﻧﮫ‬‫ﯾﺗرك‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬
‫اﻟﻣﺿﯾف‬‫ﯾﻌﻣل‬.
§‫ﻓﯾروس‬‫ﻗطﺎع‬‫اﻟﺗﻣﮭﯾد‬Boot sector Virus
‫ﯾﺻﯾب‬‫ﻗطﺎع‬‫اﻟﺗﻣﮭﯾد‬‫ﻣن‬‫اﻟﻧظﺎم‬،‫وﯾﺗم‬‫ﺗﻧﻔﯾذه‬‫ﻓﻲ‬‫ﻛل‬‫ﻣرة‬‫ﯾﺗم‬‫ﻓﯾﮭﺎ‬‫ﺗﺷﻐﯾل‬
‫اﻟﻧظﺎم‬‫وﻗﺑل‬‫ﺗﺣﻣﯾل‬‫ﻧظﺎم‬‫اﻟﺗﺷﻐﯾل‬.‫ﯾﺻﯾب‬‫اﻟوﺳﺎﺋط‬‫اﻷﺧرى‬‫اﻟﻘﺎﺑﻠﺔ‬‫ﻟﻠﺗﻣﮭﯾد‬
‫ﻣﺛل‬‫اﻷﻗراص‬‫اﻟﻣرﻧﺔ‬.‫ﻌرف‬ُ‫ﺗ‬‫ﺎ‬ً‫ﺿ‬‫أﯾ‬‫ﺑﺎﺳم‬‫ﻓﯾروس‬‫اﻟذاﻛرة‬‫ﻷﻧﮭﺎ‬‫ﻻ‬‫ﺗﺻﯾب‬
‫ﻧظﺎم‬‫اﻟﻣﻠﻔﺎت‬.
§‫ﻣﺎﻛرو‬‫ﻓﯾروس‬Macro Virus
‫ﻋﻠﻰ‬‫ﻋﻛس‬‫ﻣﻌظم‬‫اﻟﻔﯾروﺳﺎت‬‫اﻟﻣﻛﺗوﺑﺔ‬‫ﺑﻠﻐﺔ‬‫ﻣﻧﺧﻔﺿﺔ‬‫اﻟﻣﺳﺗوى‬)‫ﻣﺛل‬‫ﻟﻐﺔ‬C
‫أو‬‫ﻟﻐﺔ‬‫اﻟﺗﺟﻣﯾﻊ‬(،‫ﺗﺗم‬‫ﻛﺗﺎﺑﺗﮭﺎ‬‫ﺑﻠﻐﺔ‬‫ﻋﺎﻟﯾﺔ‬‫اﻟﻣﺳﺗوى‬‫ﻣﺛل‬Visual Basic.
‫ﯾﺗم‬‫ﺗﺷﻐﯾل‬‫ھذه‬‫اﻟﻔﯾروﺳﺎت‬‫ﻋﻧد‬‫ﺗﺷﻐﯾل‬‫ﺑرﻧﺎﻣﺞ‬‫ﻗﺎدر‬‫ﻋﻠﻰ‬‫ﺗﻧﻔﯾذ‬‫ﻣﺎﻛرو‬.‫ﻋﻠﻰ‬
‫ﺳﺑﯾل‬‫اﻟﻣﺛﺎل‬،‫ﯾﻣﻛن‬‫اﺣﺗواء‬‫ﻓﯾروس‬‫اﻟﻣﺎﻛرو‬‫ﻓﻲ‬‫ﻣﻠﻔﺎت‬‫ﺟداول‬‫اﻟﺑﯾﺎﻧﺎت‬.
§‫ﻓﯾروس‬‫رﻣز‬‫اﻟﻣﺻدر‬Source code Virus
‫ﯾﺑﺣث‬‫ﻋن‬‫رﻣز‬‫اﻟﻣﺻدر‬‫وﯾﻌدﻟﮫ‬‫ﻟﯾﺷﻣل‬‫اﻟﻔﯾروس‬‫واﻟﻣﺳﺎﻋدة‬‫ﻋﻠﻰ‬‫ﻧﺷره‬
.
§‫ﺗوﻗﯾﻊ‬‫اﻟﻔﯾروس‬Polymorphic Virus
‫ھو‬‫ﻧﻣط‬‫ﯾﻣﻛﻧﮫ‬‫اﻟﺗﻌرف‬‫ﻋﻠﻰ‬‫اﻟﻔﯾروس‬)‫ﺳﻠﺳﻠﺔ‬‫ﻣن‬‫اﻟﺑﺎﯾت‬‫اﻟﺗﻲ‬‫ﯾﺗﻛون‬‫ﻣﻧﮭﺎ‬
‫رﻣز‬‫اﻟﻔﯾروس‬.(‫ﻟذﻟك‬‫ﻟﺗﺟﻧب‬‫اﻟﻛﺷف‬‫ﻋن‬‫طرﯾق‬‫اﻟﻔﯾروﺳﺎت‬،‫ﯾﺗﻐﯾر‬‫ﻓﯾروس‬
‫ﻣﺗﻌدد‬‫اﻷﺷﻛﺎل‬‫ﻓﻲ‬‫ﻛل‬‫ﻣرة‬‫ﯾﺗم‬‫ﺗﺛﺑﯾﺗﮫ‬.‫وظﯾﻔﺔ‬‫اﻟﻔﯾروس‬‫ﺗﺑﻘﻰ‬‫ﻛﻣﺎ‬‫ھﻲ‬‫وﻟﻛن‬
‫ﺗم‬‫ﺗﻐﯾﯾر‬‫ﺗوﻗﯾﻌﮭﺎ‬.
§‫اﻟﻔﯾروﺳﺎت‬‫اﻟﻣﺷﻔرة‬Encrypted Virus
‫ﻟﺗﺟﻧب‬‫اﻟﻛﺷف‬‫ﻋن‬‫طرﯾق‬‫ﻣﻛﺎﻓﺣﺔ‬‫اﻟﻔﯾروﺳﺎت‬،‫ﯾوﺟد‬‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬
‫اﻟﻔﯾروﺳﺎت‬‫ﻓﻲ‬‫ﺷﻛل‬‫ﻣﺷﻔر‬.‫وھﻲ‬‫ﺗﺣﻣل‬‫ﺧوارزﻣﯾﺔ‬‫ﻓك‬‫ﺗﺷﻔﯾر‬‫ﻣﻌﮭﺎ‬.‫ﻟذا‬‫ﯾﻘوم‬
‫اﻟﻔﯾروس‬ً‫ﻻ‬‫أو‬‫ﺑﻔك‬‫اﻟﺷﻔرة‬‫ﺛم‬‫ﯾﻧﻔذ‬.
§‫ﻓﯾروس‬‫اﻟﺷﺑﺢ‬Stealth Virus
‫إﻧﮫ‬‫ﻓﯾروس‬‫ﺧﺎدع‬‫ﻟﻠﻐﺎﯾﺔ‬‫ﻷﻧﮫ‬‫ﯾﻐﯾر‬‫اﻟرﻣز‬‫اﻟذي‬‫ﯾﻣﻛن‬‫اﺳﺗﺧداﻣﮫ‬‫ﻻﻛﺗﺷﺎﻓﮫ‬.
‫وﺑﺎﻟﺗﺎﻟﻲ‬،‫ﯾﺻﺑﺢ‬‫اﻟﻛﺷف‬‫ﻋن‬‫اﻟﻔﯾروس‬‫ﺎ‬ً‫ﺑ‬‫ﺻﻌ‬‫ﻟﻠﻐﺎﯾﺔ‬.‫ﻋﻠﻰ‬‫ﺳﺑﯾل‬‫اﻟﻣﺛﺎل‬،
‫ﯾﻣﻛﻧﮫ‬‫ﺗﻐﯾﯾر‬‫اﺳﺗدﻋﺎء‬‫ﻧظﺎم‬‫اﻟﻘراءة‬‫ﺑﺣﯾث‬‫ﻋﻧدﻣﺎ‬‫ﯾطﻠب‬‫اﻟﻣﺳﺗﺧدم‬‫ﻗراءة‬‫رﻣز‬
‫ﺗم‬‫ﺗﻌدﯾﻠﮫ‬‫ﺑواﺳطﺔ‬‫ﻓﯾروس‬،‫ﯾﺗم‬‫ﻋرض‬‫اﻟﺷﻛل‬‫اﻷﺻﻠﻲ‬‫ﻟﻠﺗﻌﻠﯾﻣﺔ‬‫اﻟﺑرﻣﺟﯾﺔ‬
ً‫ﻻ‬‫ﺑد‬‫ﻣن‬‫اﻟرﻣز‬‫اﻟﻣﺻﺎب‬.
§‫ﻓﯾروس‬‫اﻟﻧﻔق‬Tunneling Virus
‫ﯾﺣﺎول‬‫ھذا‬‫اﻟﻔﯾروس‬‫ﺗﺟﺎوز‬‫اﻟﻛﺷف‬‫ﻋن‬‫طرﯾق‬‫ﺑرﻧﺎﻣﺞ‬‫ﻣﻛﺎﻓﺣﺔ‬‫اﻟﻔﯾروﺳﺎت‬
‫ﻋن‬‫طرﯾق‬‫ﺗﺛﺑﯾت‬‫ﻧﻔﺳﮫ‬‫ﻓﻲ‬‫ﺳﻠﺳﻠﺔ‬‫ﻣﻌﺎﻟﺞ‬‫اﻟﻣﻘﺎطﻌﺔ‬.‫ﯾﺗم‬‫ﺗﻌطﯾل‬‫ﺑراﻣﺞ‬
‫اﻻﻋﺗراض‬،‫اﻟﺗﻲ‬‫ﺗظل‬‫ﻓﻲ‬‫ﺧﻠﻔﯾﺔ‬‫ﻧظﺎم‬‫اﻟﺗﺷﻐﯾل‬‫وﺗﻠﺗﻘط‬‫اﻟﻔﯾروﺳﺎت‬،‫أﺛﻧﺎء‬
‫اﻹﺻﺎﺑﺔ‬‫ﺑﻔﯾروس‬‫ﻧﻔق‬.‫ﺗﺛﺑﯾت‬‫ﻓﯾروﺳﺎت‬‫ﻣﻣﺎﺛﻠﺔ‬‫ﻓﻲ‬‫ﺑراﻣﺞ‬‫ﺗﺷﻐﯾل‬‫اﻷﺟﮭزة‬.
§‫ﻓﯾروس‬‫ﻣﺗﻌدد‬‫اﻷﺟزاء‬Multipartite Virus
‫ھذا‬‫اﻟﻧوع‬‫ﻣن‬‫اﻟﻔﯾروﺳﺎت‬‫ﻗﺎدر‬‫ﻋﻠﻰ‬‫إﺻﺎﺑﺔ‬‫أﺟزاء‬‫ﻣﺗﻌددة‬‫ﻣن‬‫اﻟﻧظﺎم‬‫ﺑﻣﺎ‬‫ﻓﻲ‬
‫ذﻟك‬‫ﻗطﺎع‬‫اﻟﺗﻣﮭﯾد‬‫واﻟذاﻛرة‬‫واﻟﻣﻠﻔﺎت‬.‫ھذا‬‫ﯾﺟﻌل‬‫ﻣن‬‫اﻟﺻﻌب‬‫اﻛﺗﺷﺎف‬
‫واﺣﺗواء‬.
§‫اﻟﻔﯾروس‬‫اﻟﻣدرع‬Armored Virus
‫ﯾﺗم‬‫ﺗرﻣﯾز‬‫اﻟﻔﯾروس‬‫اﻟﻣدرع‬‫ﻟﺟﻌل‬‫ﻣن‬‫اﻟﺻﻌب‬‫ﻋﻠﻰ‬‫ﻣﺿﺎدات‬‫اﻟﻔﯾروﺳﺎت‬
‫اﻟﻛﺷف‬‫ﻋﻧﮫ‬‫وﻓﮭﻣﮫ‬.‫ﯾﺳﺗﺧدم‬‫ﻣﺟﻣوﻋﺔ‬‫ﻣﺗﻧوﻋﺔ‬‫ﻣن‬‫اﻟﺗﻘﻧﯾﺎت‬‫ﻟﻠﻘﯾﺎم‬‫ﺑذﻟك‬‫ﻣﺛل‬
‫ﺧداع‬‫ﻣﻛﺎﻓﺣﺔ‬‫اﻟﻔﯾروﺳﺎت‬‫ﻟﻼﻋﺗﻘﺎد‬‫أﻧﮫ‬‫ﯾﻘﻊ‬‫ﻓﻲ‬‫ﻣﻛﺎن‬‫آﺧر‬‫ﻏﯾر‬‫ﻣوﻗﻌﮫ‬
‫اﻟﺣﻘﯾﻘﻲ‬‫أو‬‫ﯾﺳﺗﺧدم‬‫اﻟﺿﻐط‬‫ﻟﺗﻌﻘﯾد‬‫اﻟﺗﻌﻠﯾﻣﺎت‬‫اﻟﺑرﻣﺟﯾﺔ‬‫اﻟﺧﺎﺻﺔ‬‫ﺑﮫ‬.
3. Literature View
‫داﺧل‬ ‫ﺳواء‬ ، ‫اﻟﺷﺑﻛﺔ‬ ‫ﻟﻣﺳﺗﺧدﻣﻲ‬ ‫اﻷھﻣﯾﺔ‬ ‫ﻣﺗزاﯾدة‬ ‫ﻣﺷﻛﻠﺔ‬ ‫اﻷﻣﺎن‬ ‫ﯾﻌد‬‫ﻋﻠﻰ‬ ‫ﺗﻌﻣل‬ ‫اﻟﺗﻲ‬ ‫اﻟﻣؤﺳﺳﺎت‬
‫ﺗﺄﻣﯾن‬ ‫ﻷﻏراض‬ ‫ﻛﺑﯾرة‬ ‫ﺗﻘﻧﯾﺔ‬ ‫ﺗطوﯾر‬ ‫ﺗم‬ .‫اﻟﻌﺎﻟﻣﯾﺔ‬ ‫اﻟﺑﯾﺎﻧﺎت‬ ‫ﻟﺷﺑﻛﺎت‬ ‫أو‬ ، ‫ﺑﺈﻧﺗراﻧت‬ ‫ﯾﺳﻣﻰ‬ ‫ﻣﺎ‬
) :‫اﻷﻗل‬ ‫ﻋﻠﻰ‬ ‫اﻟﺗﺎﻟﯾﺔ‬ ‫اﻟﻣﻧﺗﺟﺎت‬ ‫ﻓﺋﺎت‬ ‫ﺗطوﯾرھﺎ‬ ‫ﺗم‬ ‫اﻟﺗﻲ‬ ‫اﻷﻣﺎن‬ ‫ﻣﯾزات‬ ‫ﺗﺗﺿﻣن‬ .‫اﻟﺷﺑﻛﺎت‬1(
) ، ‫اﻟﺗﺻﻔﯾﺔ‬2) ، ‫اﻟوﺻول‬ ‫ﻓﻲ‬ ‫اﻟﺗﺣﻛم‬ (3) ، ‫اﻟﻣﺣﻣﯾﺔ‬ ‫اﻻﺗﺻﺎﻻت‬ (4‫اﻟﻣﺳﺎﻋدة‬ () ، ‫اﻷﻣﻧﯾﺔ‬5(
‫اﻷﻣﺎن‬ ‫ﺳﯾﺎﺳﺔ‬ ‫إدارة‬.
‫اﻟطﺑﻘﺎت‬ ‫ﻣﺗﻌدد‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﻧظﺎم‬ ‫ﺗطﺑﯾق‬ ‫ﺗم‬ ‫ﻓﺑذﻟك‬
‫ﻣن‬‫اﻟﺷﺑﻛﺔ‬ ‫أﺟﮭزة‬ ‫ﻣن‬ ‫ﻣﺗﻧوﻋﺔ‬ ‫ﻣﺟﻣوﻋﺔ‬ ‫ﻓﻲ‬ ‫ﻟﻠﺷﺑﻛﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫وظﺎﺋف‬ ‫ﺗوزﯾﻊ‬ ‫ﺧﻼل‬
‫ﻣﺗﻌدد‬ ‫اﻟﻣﺗﻔﺷﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﯾﺗﺿﻣن‬ .‫اﻻﻧﺗﺷﺎر‬ ‫واﺳﻊ‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺗﻧﻔﯾذ‬ ‫ﯾﺗم‬ ، ‫اﻟطرﻓﯾﺔ‬ ‫واﻷﻧظﻣﺔ‬
‫أن‬ ‫ﯾﺟب‬ ‫اﻟﺗﻲ‬ ‫اﻟﻛﯾﻔﯾﺔ‬ ‫ﺗﺣدد‬ ‫اﻟﺗﻲ‬ ‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﺑﯾﺎﻧﺎت‬ ‫ﯾﻘﺑل‬ ‫اﻟذي‬ ‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﺗﻌرﯾف‬ ‫ﻣﻛون‬ ‫اﻟطﺑﻘﺎت‬
‫ا‬ ‫ﺟدار‬ ‫ﺑﮭﺎ‬ ‫ﯾﺗﺻرف‬‫ﯾﺗم‬ ‫ﺎ‬ً‫ﻧ‬‫ﻣﻛو‬ ‫أو‬ ، ‫ﺎ‬ً‫ﯾ‬‫ﻣرﻛز‬ ‫ﺎ‬ً‫ﻧ‬‫ﻣﻛو‬ ‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﺗﻌرﯾف‬ ‫ﻣﻛون‬ ‫ﯾﻛون‬ ‫أن‬ ‫ﯾﻣﻛن‬ .‫ﻟﺣﻣﺎﯾﺔ‬
‫اﻟﺷﺑﻛﺔ‬ ‫أﺟﮭزة‬ ‫ﻣن‬ ‫ﻣﺟﻣوﻋﺔ‬ ‫ﺎ‬ً‫ﺿ‬‫أﯾ‬ ‫اﻟطﺑﻘﺎت‬ ‫ﻣﺗﻌدد‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﯾﺗﺿﻣن‬ .‫اﻟﺷﺑﻛﺔ‬ ‫ﻋﺑر‬ ‫ﺗوزﯾﻌﮫ‬
‫ﻓﻲ‬ ‫ﻟﻠﺷﺑﻛﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫وظﺎﺋف‬ ‫ﺗوزﯾﻊ‬ ‫ﺧﻼل‬ .‫اﻟﻣﺣددة‬ ‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﻟﻔرض‬ ‫اﺳﺗﺧداﻣﮭﺎ‬ ‫ﯾﺗم‬ ‫اﻟﺗﻲ‬
‫أﺟﮭزة‬ ‫ﻣن‬ ‫ﻣﺗﻧوﻋﺔ‬ ‫ﻣﺟﻣوﻋﺔ‬‫ﺟدار‬ ‫ﺗﻧﻔﯾذ‬ ‫ﯾﺗم‬ ، ‫اﻟطرﻓﯾﺔ‬ ‫واﻷﻧظﻣﺔ‬ ‫اﻟﺷﺑﻛﺔ‬
‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﺗﻌرﯾف‬ ‫ﻣﻛون‬ ‫اﻟطﺑﻘﺎت‬ ‫ﻣﺗﻌدد‬ ‫اﻟﻣﺗﻔﺷﻲ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﯾﺗﺿﻣن‬ .‫اﻻﻧﺗﺷﺎر‬ ‫واﺳﻊ‬ ‫ﺣﻣﺎﯾﺔ‬
‫أن‬ ‫ﯾﻣﻛن‬ .‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﺑﮭﺎ‬ ‫ﯾﺗﺻرف‬ ‫أن‬ ‫ﯾﺟب‬ ‫اﻟﺗﻲ‬ ‫اﻟﻛﯾﻔﯾﺔ‬ ‫ﺗﺣدد‬ ‫اﻟﺗﻲ‬ ‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﺑﯾﺎﻧﺎت‬ ‫ﯾﻘﺑل‬ ‫اﻟذي‬
‫أو‬ ، ‫ﺎ‬ً‫ﯾ‬‫ﻣرﻛز‬ ‫ﺎ‬ً‫ﻧ‬‫ﻣﻛو‬ ‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﺗﻌرﯾف‬ ‫ﻣﻛون‬ ‫ﯾﻛون‬‫ﺟدار‬ ‫ﯾﺗﺿﻣن‬ .‫اﻟﺷﺑﻛﺔ‬ ‫ﻋﺑر‬ ‫ﺗوزﯾﻌﮫ‬ ‫ﯾﺗم‬ ‫ﺎ‬ً‫ﻧ‬‫ﻣﻛو‬
‫اﻟﺳﯾﺎﺳﺔ‬ ‫ﻟﻔرض‬ ‫اﺳﺗﺧداﻣﮭﺎ‬ ‫ﯾﺗم‬ ‫اﻟﺗﻲ‬ ‫اﻟﺷﺑﻛﺔ‬ ‫أﺟﮭزة‬ ‫ﻣن‬ ‫ﻣﺟﻣوﻋﺔ‬ ‫ﺎ‬ً‫ﺿ‬‫أﯾ‬ ‫اﻟطﺑﻘﺎت‬ ‫ﻣﺗﻌدد‬ ‫اﻟﺣﻣﺎﯾﺔ‬
.‫اﻟﻣﺣددة‬
‫ا‬‫أو‬ ‫رؤوﺳﮭﺎ‬ ‫داﺧل‬ ‫اﻟﻘﯾم‬ ‫ﻋﻠﻰ‬ ً‫ء‬‫ﺑﻧﺎ‬ ‫اﻹطﺎرات‬ ‫أو‬ ‫اﻟﺣزم‬ ‫ﺗﺣوﯾل‬ ‫أو‬ ‫إﺳﻘﺎط‬ ‫ﻋﻠﻰ‬ ‫ﺗﻧطوي‬ ‫ﻟﺗﺻﻔﯾﺔ‬
‫ﺗﻘر‬ ‫اﻟوﺻول‬ ‫ﻓﻲ‬ ‫اﻟﺗﺣﻛم‬ ‫ﯾﺗﺿﻣن‬ .‫ﺑﯾﺎﻧﺎﺗﮭﺎ‬ ‫داﺧل‬‫اﻟﻣﺳﺗﺧدم‬ ‫أو‬ ‫اﻟﻣﺳﺗﺧدم‬ ‫ﻣﻧﺢ‬ ‫ﯾﺟب‬ ‫ﻛﺎن‬ ‫إذا‬ ‫ﻣﺎ‬ ‫ﯾر‬
‫اﻟذي‬‫اﻟﻌﻣﻠﯾﺎت‬ ‫إﻟﻰ‬ ‫اﻟﻣﺣﻣﯾﺔ‬ ‫اﻻﺗﺻﺎﻻت‬ ‫ﺗﺷﯾر‬ .‫ﻣﻌﯾن‬ ‫ﺣوﺳﺑﺔ‬ ‫ﻣورد‬ ‫إﻟﻰ‬ ‫اﻟوﺻول‬ ‫ﺣق‬ ‫اﺗﺻﺎﻟﮫ‬ ‫ﯾﺑدأ‬
‫ﻟﮭم‬ ‫ﻣﺻرح‬ ‫ﻏﯾر‬ ‫أﻓراد‬ ‫ﻗﺑل‬ ‫ﻣن‬ ‫ﻗراءﺗﮭﺎ‬ ‫أو‬ ‫اﻟﺑﯾﺎﻧﺎت‬ ‫أو‬ ‫اﻟﺗﺣﻛم‬ ‫ﻣﻌﻠوﻣﺎت‬ ‫ﺗﻌدﯾل‬ ‫ﻋدم‬ ‫ﺗﺿﻣن‬ ‫اﻟﺗﻲ‬.
‫ﺗ‬‫ﺗﺣﻣﻲ‬ ‫اﻟﺗﻲ‬ ‫اﻟﺗطﺑﯾق‬ ‫وﻛﯾل‬ ‫ﺑواﺑﺎت‬ ‫ﻣﺛل‬ ، ‫اﻟﺣدود‬ ‫ﻛﻣﻌدات‬ ‫اﻟﻧﺎرﯾﺔ‬ ‫اﻟﺟدران‬ ‫ﺗﻧﻔﯾذ‬ ‫ﯾﺗم‬ ، ‫ﻘﻠﯾدﯾﺎ‬
‫ﺑﯾن‬ ‫ﻣﺎ‬ ‫ﯾﻛون‬ ‫أن‬ ‫اﻟﻣﺣﺗﻣل‬ ‫ﻓﻣن‬ ، ‫ذﻟك‬ ‫وﻣﻊ‬ .‫اﻟﺧﺎرﺟﻲ‬ ‫اﻟﮭﺟوم‬ ‫ﻣن‬ ‫ﺧﺎﺻﺔ‬ ‫ﺷﺑﻛﺔ‬50٪‫و‬85٪
‫ﻗﺑل‬ ‫ﻣن‬ ‫اﻟﻣﺛﺎل‬ ‫ﺳﺑﯾل‬ ‫ﻋﻠﻰ‬ ، ‫اﻟداﺧﻠﯾﺔ‬ ‫ﻟﻠﮭﺟﻣﺎت‬ ‫ﻧﺗﯾﺟﺔ‬ ‫اﻟﺷرﻛﺎت‬ ‫ﺗﻛﺑدﺗﮭﺎ‬ ‫اﻟﺗﻲ‬ ‫اﻟﺧﺳﺎﺋر‬ ‫ﻣن‬
‫اﻟﺳﺎ‬ ‫اﻟﻣوظﻔﯾن‬‫ﻟﺷﺑﻛﺎت‬ ‫اﻟرﺋﯾﺳﯾﺔ‬ ‫اﻷﻣﻧﯾﺔ‬ ‫اﻟﻣﺗطﻠﺑﺎت‬ ‫أﺣد‬ ‫ﻓﺈن‬ ، ‫وﺑﺎﻟﺗﺎﻟﻲ‬ .‫اﻻﻧﺗﮭﺎزﯾﯾن‬ ‫أو‬ ‫ﺧطﯾن‬
‫اﻟﮭﺟﻣﺎت‬ ‫ﻣن‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ھو‬ ‫ﺑﺎﻟﺷرﻛﺎت‬ ‫اﻟﺧﺎﺻﺔ‬ ‫اﻹﻧﺗراﻧت‬*-.‫اﻟداﺧﻠﯾﺔ‬
‫ﻣﺗزاﯾد‬ ‫ﺑﺷﻛل‬ ‫ﻟﻠﺷرﻛﺎت‬ ‫اﻟﺣدﯾﺛﺔ‬ ‫اﻟﺗﺟﺎرﯾﺔ‬ ‫اﻷﻋﻣﺎل‬ ‫اﻗﺗﺻﺎدﯾﺎت‬ ‫ﺗﺗطﻠب‬ ، ‫ذﻟك‬ ‫إﻟﻰ‬ ‫ﺑﺎﻹﺿﺎﻓﺔ‬
‫ﻣ‬ ‫اﻟﺷراﻛﺔ‬ ‫أو‬ ‫ﻟﻠﻌﻣل‬ ‫ﺧﺎرﺟﯾﺔ‬ ‫ﺑﻣﺻﺎدر‬ ‫اﻻﺳﺗﻌﺎﻧﺔ‬‫ﺑﻣﺻﺎدر‬ ‫اﻻﺳﺗﻌﺎﻧﺔ‬ ‫ﻓﺈن‬ .‫أﺧرى‬ ‫ﺷرﻛﺎت‬ ‫ﻊ‬
‫اﻟﺑﻌض‬ ‫ﺑﻌﺿﮭﺎ‬ ‫ﻣﻊ‬ ‫اﻟﻣﻌﻠوﻣﺎت‬ ‫ﻣﺷﺎرﻛﺔ‬ ‫اﻟﺷرﻛﺎت‬ ‫ﻣن‬ ‫ﺎ‬ً‫ﻣ‬‫داﺋ‬ ‫ﯾﺗطﻠب‬ ‫اﻟﺷراﻛﺎت‬ ‫وإﻗﺎﻣﺔ‬ ‫ﺧﺎرﺟﯾﺔ‬
‫اﻹﻟﻛﺗروﻧﯾﺔ‬ ‫اﻟوﺳﺎﺋل‬ ‫ﺑﺎﺳﺗﺧدام‬.
‫اﻟوﺻول‬ ‫أﺧرى‬ ‫ﺷرﻛﺎت‬ ‫ﻣﻧﺢ‬ ‫اﻟﺷرﻛﺔ‬ ‫ﻣن‬ ‫واﻟﺷراﻛﺔ‬ ‫ﺧﺎرﺟﯾﺔ‬ ‫ﺑﻣﺻﺎدر‬ ‫اﻻﺳﺗﻌﺎﻧﺔ‬ ‫ﯾﺗطﻠب‬ ‫وﺑﺎﻟﺗﺎﻟﻲ‬
‫ﻋﻼ‬ .‫اﻟداﺧﻠﯾﺔ‬ ‫ﺷﺑﻛﺗﮭﺎ‬ ‫ﻣن‬ ‫أﺟزاء‬ ‫إﻟﻰ‬‫ﺑﻣﺻﺎدر‬ ‫اﻻﺳﺗﻌﺎﻧﺔ‬ ‫ﺗرﺗﯾﺑﺎت‬ ‫ﻛل‬ ‫ﺗﺗﺿﻣن‬ ، ‫ذﻟك‬ ‫ﻋﻠﻰ‬ ‫وة‬
‫اﻟﻧﺳﺑﺔ‬ ‫أن‬ ‫ﯾﻌﻧﻲ‬ ‫وھذا‬ .‫اﻟﺷرﻛﺔ‬ ‫ﻣن‬ ‫ﻣﺧﺗﻠﻔﺔ‬ ‫أﻗﺳﺎم‬ ‫أو‬ ‫ﻓرﻋﯾﺔ‬ ‫ﺷرﻛﺎت‬ ‫ﻋﺎدة‬ ‫اﻟﺷراﻛﺔ‬ ‫أو‬ ‫ﺧﺎرﺟﯾﺔ‬
‫واﺣد‬ ‫ﺧﺎرﺟﻲ‬ ‫ﻗﻠق‬ ‫ﻣﺻدر‬ ‫ﻗﺑل‬ ‫ﻣن‬ ‫إﻟﯾﮭﺎ‬ ‫اﻟوﺻول‬ ‫ﯾﻣﻛن‬ ‫اﻟﺗﻲ‬ ‫ﻟﻠﺷرﻛﺔ‬ ‫اﻟﻣﻌﻠوﻣﺎت‬ ‫ﻷﺻول‬ ‫اﻟﻣﺋوﯾﺔ‬
.‫ﻣﺎ‬ ‫ﺣد‬ ‫إﻟﻰ‬ ‫ﻛﺑﯾرة‬ ‫ﺗﺻﺑﺢ‬ ‫اﻷﻗل‬ ‫ﻋﻠﻰ‬
‫اﻟﺟداراﻟﻧﺎري‬‫اﻟﺗﻘﻠﯾدي‬‫ھذﯾن‬ ‫ﻋن‬ ‫اﻟﻧﺎﺷﺋﺔ‬ ‫اﻷﻣﺎن‬ ‫ﻣﺗطﻠﺑﺎت‬ ‫ﻟﺗﻠﺑﯾﺔ‬ ‫ﻛﺑﯾر‬ ‫ﺣد‬ ‫إﻟﻰ‬ ‫ﻣﻼﺋم‬ ‫ﻏﯾر‬
.‫ﻟﻠﺑﯾﺎﻧﺎت‬ ‫اﻟواﺳﻌﺔ‬ ‫اﻟﺧﺎرﺟﯾﺔ‬ ‫واﻟﻣﺷﺎرﻛﺔ‬ ‫اﻟداﺧﻠﯾﺔ‬ ‫اﻟﺗﮭدﯾدات‬ ‫ﻣن‬ ‫ﯾﻧﺷﺄ‬ ‫واﻟذي‬ ، ‫اﻟﺷﺎﻏﻠﯾن‬
‫ﺟدران‬ ‫ﻓﻲ‬ "‫"ﺛﻘوب‬ ‫ﻋﻣل‬ ‫ﯾﺟب‬ ، ‫اﻟﺷرﻛﺔ‬ ‫ﻟﻣﻌﻠوﻣﺎت‬ ‫اﻟﺧﺎرﺟﻲ‬ ‫اﻟوﺻول‬ ‫اﺳﺗﯾﻌﺎب‬ ‫أﺟل‬ ‫ﻣن‬
‫اﻟﻣﻌ‬ ‫ﺑﺗدﻓق‬ ‫ﻟﻠﺳﻣﺎح‬ ‫اﻟﺣدودﯾﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬‫اﻟﻼزﻣﺔ‬ ‫ﻠوﻣﺎت‬‫ﺗﺗﺟﺎوز‬ ‫ﻗد‬ ، ‫اﻟﻘﺻوى‬ ‫اﻟﺣﺎﻻت‬ ‫ﻓﻲ‬ .
‫ﺷرﻛﺎت‬ ‫ﻣﻊ‬ ‫ﻣﺑﺎﺷرة‬ ‫اﺗﺻﺎﻻت‬ ‫وﺗوﻓر‬ ‫ﺎ‬ً‫ﻣ‬‫ﺗﻣﺎ‬ ‫ﺑﺎﻟﺷرﻛﺎت‬ ‫اﻟﺧﺎﺻﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدران‬ ‫ﺑﺑﺳﺎطﺔ‬ ‫اﻷﻗﺳﺎم‬
.‫ﻣوظﻔﯾﮭﺎ‬ ‫أو‬ ‫واﻟﺷراﻛﺔ‬ ‫ﺧﺎرﺟﯾﺔ‬ ‫ﺑﻣﺻﺎدر‬ ‫اﻻﺳﺗﻌﺎﻧﺔ‬
‫أ‬‫ﺟدران‬ ‫ووﺿﻊ‬ ‫ﻗطﻊ‬ ‫ﻋدة‬ ‫إﻟﻰ‬ ‫اﻟﺷرﻛﺔ‬ ‫إﻧﺗراﻧت‬ ‫ﺗﻘﺳﯾم‬ ‫ھو‬ ‫اﻟﻣﺗطﻠﺑﺎت‬ ‫ھذه‬ ‫ﻟﺗﻠﺑﯾﺔ‬ ‫اﻷﺳﺎﻟﯾب‬ ‫ﺣد‬
‫أن‬ ‫أي‬ .‫اﻟﺷرﻛﺔ‬ ‫إﻧﺗراﻧت‬ ‫إﻟﻰ‬ ‫اﺧﺗﻧﺎﻗﺎت‬ ‫ﯾﻘدم‬ ‫ﻟﻛﻧﮫ‬ ، ‫ﻗﯾﻣﺔ‬ ‫ﻟﮫ‬ ‫اﻟﻧﮭﺞ‬ ‫ھذا‬ .‫ﺑﯾﻧﮭﻣﺎ‬ ‫اﻟﺣدودﯾﺔ‬ ‫اﻟﺣﻣﺎﯾﺔ‬
، ‫دﻗﺔ‬ ‫أﻛﺛر‬ ‫اﻟﺗﻘﺳﯾم‬ ‫ﯾﺻﺑﺢ‬ ‫ﻋﻧدﻣﺎ‬ .‫اﻟﺷرﻛﺔ‬ ‫داﺧل‬ ‫اﻷداء‬ ‫ﻋﻠﻰ‬ ‫ﺎ‬ً‫ﺑ‬‫ﺳﻠ‬ ‫ﺗؤﺛر‬ ‫اﻟداﺧﻠﯾﺔ‬ ‫اﻟﻧﺎرﯾﺔ‬ ‫اﻟﺟدران‬
‫ﻣﺗزاﯾ‬ ‫ﺑﺷﻛل‬ ‫ا‬ً‫ﻣﺗدھور‬ ً‫ء‬‫أدا‬ ‫ﯾواﺟﮫ‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻗﺳم‬ ‫ﺧﺎرج‬ ‫اﻟﻣوارد‬ ‫إﻟﻰ‬ ‫اﻟوﺻول‬ ‫ﻓﺈن‬‫د‬‫وﺑﻧﺎء‬
‫ﻣن‬ ‫ﻣﺗﻌددة‬ ‫طﺑﻘﺎت‬ ‫ﻋﺑر‬ ‫ﻣﻧﺳﻘﺔ‬ ‫أﻣﻧﯾﺔ‬ ‫ﺳﯾﺎﺳﺔ‬ ‫ﺑﺗﻧﻔﯾذ‬ ‫ﯾﺳﻣﺢ‬ ‫ﻧظﺎم‬ ‫ﺗطﺑﯾق‬ ‫اﻟﻣﺳﺗﺣﺳن‬ ‫ﻣن‬ ، ‫ذﻟك‬ ‫ﻋﻠﻰ‬
‫اﻟﺷﺑﻛﺔ‬ ‫أﻧظﻣﺔ‬.
4. Methodology and Research design
‫وﻛل‬ ‫ﺳﺎﻋﮫ‬ ‫ﻛل‬ ‫ﻧظﺎﻣك‬ ‫ﻋﻠﻲ‬ ‫اﻟﻣﻣﻛﻧﺔ‬ ‫اﻟﮭﺟﻣﺎت‬ ‫ﻛم‬ ‫ﻟﺗوﺿﯾﺢ‬ ‫ﻣﺑدﺋﻲ‬ ‫ﺑﺣث‬ ‫ﻋن‬ ‫ﻣﺛﺎل‬ ‫ﺳﺗﻌرض‬ ‫ھﻧﺎ‬
... ‫ﯾوم‬
‫ﯾﺳﺟل‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬ISP‫ﻟﻸﻋﻣﺎل‬‫اﻟﺗﺟﺎرﯾﺔ‬‫اﻟﺻﻐﯾرة‬‫ﺣرﻛﺔ‬‫اﻟﻣرورﻏﯾراﻟﻣﺻرح‬‫ﺑﮭﺎ‬
‫واﻟﻣﺷﺑوھﺔ‬‫اﻟﺗﻲ‬‫ﺗﺣﺎول‬‫دﺧول‬‫اﻟﺷﺑﻛﺔ‬‫اﻟﻣﺣﻠﯾﺔ‬.‫ﯾﺣﺗوي‬‫ﻛل‬‫إدﺧﺎل‬‫ﺳﺟل‬‫ﻋﻠﻰ‬‫اﻟﻣﻌﻠوﻣﺎت‬‫اﻟﺗﺎﻟﯾﺔ‬:
•‫اﻟﺗﺎرﯾﺦ‬/‫اﻟوﻗت‬:‫ﺗﺎرﯾﺦ‬‫ووﻗت‬‫ﺣدوث‬‫اﻟﻧﺷﺎط‬،‫وﺗم‬‫ﺗﺧزﯾﻧﮭﻣﺎ‬‫ﺑﺎﻟﺗوﻗﯾت‬‫اﻟﻣﺣﻠﻲ‬.
•‫ﻧوع‬‫اﻟﺣدث‬:‫إﺷﻌﺎر‬‫أو‬‫ﺗﻧﺑﯾﮫ‬،‫ﯾﺻف‬‫ﻣﺳﺗوى‬‫ﺷدة‬‫اﻟﺣدث‬.
•‫وﺻف‬‫اﻟﺣدث‬:‫ﻣﻧﻊ‬‫اﻟﺗطﻔل‬‫أو‬‫اﻟوﺻول‬‫إﻟﻰ‬‫اﻟﺷﺑﻛﺔ‬،‫ﯾﺻف‬‫اﻟﮭﺟﻣﺎت‬‫ﺑﺄﻧﮭﺎ‬‫إﻣﺎ‬
‫ﻣﺑﺎﺷر‬‫أو‬‫ﻏﯾر‬‫رﺳﻣﻲ‬.
•‫اﻹﺟراء‬:‫اﻹﺟراء‬‫اﻟذي‬‫ﺗم‬‫اﺗﺧﺎذه‬‫ﻟرﻓض‬‫اﻟﮭﺟوم‬)‫إﺳﻘﺎط‬‫ﻣﺣﺎﻛﺎة‬‫ﺳﺎﺧرة‬IP،‫ﺣزﻣﺔ‬TCP /
Fin‫ﻟـ‬TCP‫إﺳﻘﺎط‬،‫إﺳﻘﺎط‬‫ﺣزﻣﺔ‬UDP،‫إﺳﻘﺎط‬‫طﻠب‬‫اﻟوﺻول‬‫إﻟﻰ‬‫وﯾب‬(
•‫ﻣﺻدر‬IP:‫رﻗم‬IP‫اﻟﺧﺎص‬‫ﺑﺎﻟﺟﮭﺎز‬‫اﻟذي‬‫ﯾﻘوم‬‫ﺑﺎﻟﮭﺟوم‬.
‫ﺗم‬‫ﺟﻣﻊ‬‫ﺳﺟﻼت‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺑواﺳطﺔ‬‫اﻟﺑﺎﺣﺛﯾن‬‫وﺗﺟﻣﯾﻌﮭﺎ‬‫ﻓﻲ‬‫ﺷﻛل‬‫ﻗﺎﺑل‬‫ﻟﻼﺳﺗﺧدام‬‫ﻟﻠﺗﺣﻠﯾل‬.‫ﺛم‬
‫ﻗﺎم‬‫اﻟﻣؤﻟﻔون‬‫ﺑﺗﺟﻣﯾﻊ‬‫ﺑﯾﺎﻧﺎت‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫واﻹﺣﺻﺎءات‬‫اﻟوﺻﻔﯾﺔ‬‫اﻟﻣﺣﺳوﺑﺔ‬.‫و‬‫ﻛﺎﻧت‬‫ﻣﺗﻐﯾرات‬
‫اﻟﻔﺎﺋدة‬
1(‫ﻋدد‬‫اﻟﮭﺟﻣﺎت‬‫ﻓﻲ‬‫اﻷﺳﺑوع‬،2(‫ﻋدد‬‫اﻟﮭﺟﻣﺎت‬‫ﻷﯾﺎم‬‫اﻷﺳﺑوع‬،3(‫ھدف‬‫اﻟﮭﺟﻣﺎت‬،4(
‫وﻗت‬‫اﻟﮭﺟوم‬‫ﻓﻲ‬‫اﻟﯾوم‬
‫ﺗم‬‫اﺳﺗﺧدام‬‫اﺧﺗﺑﺎرات‬ANOVA‫ﻟﺗﺣدﯾد‬‫ﻣﺎ‬‫إذا‬‫ﻛﺎن‬‫ھﻧﺎك‬‫ﻓرق‬‫ﻛﺑﯾر‬‫ﺑﯾن‬‫اﻟﮭﺟﻣﺎت‬‫ﺑﺎﻟﺳﺎﻋﺔ‬
‫واﻟﯾوم‬‫واﻷﺳﺑوع‬.
ü‫اﻟﻧﺗﺎﺋﺞ‬...
‫ﺗﺛﺑت‬‫اﻟﻧﺗﺎﺋﺞ‬‫اﻟﺣﺎﺟﺔ‬‫إﻟﻰ‬‫اﻟﺣﻣﺎﯾﺔ‬‫اﻹﺿﺎﻓﯾﺔ‬‫اﻟﺗﻲ‬‫ﺗوﻓرھﺎ‬‫ﺟدران‬‫اﻟﺣﻣﺎﯾﺔ‬.‫وﺟدت‬‫اﻟدراﺳﺔ‬
‫أن‬‫ﻣﻌظم‬‫اﻟﮭﺟﻣﺎت‬‫ﻋﻠﻰ‬‫ﺷﺑﻛﺔ‬ISP‫ﻟﻠﺷرﻛﺎت‬‫اﻟﺻﻐﯾرة‬‫وﻗﻌت‬‫ﺣواﻟﻲ‬‫اﻟﺳﺎﻋﺔ‬02:00
‫ﻛﺎﻧت‬‫ﻏﺎﻟﺑﯾﺔ‬‫اﻟﮭﺟﻣﺎت‬‫ﺑﯾن‬‫اﻟﺳﺎﻋﺔ‬10ً‫ء‬‫ﻣﺳﺎ‬‫و‬8‫ﺎ‬ً‫ﺣ‬‫ﺻﺑﺎ‬.‫ﻗد‬‫ﯾﻌﻧﻲ‬‫ھذا‬‫أن‬‫اﻟﻣﺗﺳﻠﻠﯾن‬‫ﺗﺟﻧﺑوا‬
‫ﺳﺎﻋﺎت‬‫اﻟﻌﻣل‬‫اﻟﻌﺎدﯾﺔ‬‫أو‬‫ﯾﻣﺎرس‬‫ھذا‬‫اﻟﺷﺧص‬‫ھذه‬‫اﻟﮭﺟﻣﺎت‬‫أﺛﻧﺎء‬‫أوﻗﺎت‬‫اﻟﻔراغ‬.
‫وذﻛر‬‫ﺷﺎﻧﺗﺎوت‬‫وﻏﯾﺗﺎ‬)2010(‫أن‬"‫اﻟﺗﺧﻔﯾض‬‫اﻟواﺿﺢ‬‫ﻓﻲ‬‫ﻋدد‬‫اﻟﮭﺟﻣﺎت‬
‫اﻟﺗﻲ‬‫ﺗم‬‫اﻟﻛﺷف‬‫ﻋﻧﮭﺎ‬‫ﺧﻼل‬‫ﺳﺎﻋﺎت‬‫اﻟﻌﻣل‬‫رﺑﻣﺎ‬‫ﺗﻛون‬‫ﻧﺎﺟﻣﺔ‬‫ﻋن‬‫ازدﺣﺎم‬‫ﺣرﻛﺔ‬‫اﻟﻣرور‬‫اﻟﻣﺣﻠﯾﺔ‬
‫ﻋﻠﻰ‬‫اﻹﻧﺗرﻧت‬.
‫ﻓﻲ‬‫اﻟﻣﺗوﺳط‬،‫ﻛﺎن‬‫ھﻧﺎك‬312‫ﺎ‬ً‫ﻣ‬‫ھﺟو‬‫ﻓﻲ‬‫اﻟﺳﺎﻋﺔ‬‫ﺑﺎﻧﺣراف‬‫ﻣﻌﯾﺎري‬‫ﯾﺑﻠﻎ‬33.
‫اﻟﺣد‬‫اﻷﻗﺻﻰ‬‫ﻛﺎن‬‫ﻋدد‬‫اﻟﮭﺟﻣﺎت‬356‫ﻓﻲ‬‫اﻟﺳﺎﻋﺔ‬02:00‫وﻛﺎن‬‫اﻟﺣد‬‫اﻷدﻧﻰ‬260‫ﻓﻲ‬
13:00.
‫ﺷﻛل‬2‫ﺑﯾﺎﻧﯾﺎ‬
‫ﯾظﮭر‬‫ﻣﺗوﺳط‬‫ﻋدد‬‫اﻟﮭﺟﻣﺎت‬‫ﺑﺎﻟﺳﺎﻋﺔ‬.
‫ظﮭر‬ُ‫ﯾ‬‫ﺗﺣﻠﯾل‬‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬ISP‫ﻟﻸﻋﻣﺎل‬‫اﻟﺗﺟﺎرﯾﺔ‬‫اﻟﺻﻐﯾرة‬‫أن‬‫اﻟﺷﺑﻛﺔ‬‫ﺗﻌرﺿت‬‫ﻟﻠﮭﺟوم‬‫ﺣواﻟﻲ‬
276‫ﻣرة‬‫ﻓﻲ‬‫اﻟﯾوم‬.‫ﺗﻣت‬‫ﻣﮭﺎﺟﻣﺔ‬‫ﺟدار‬‫اﻟﺣﻣﺎﯾﺔ‬‫ﺑواﺳطﺔ‬822،2‫ﺎ‬ً‫ﻔ‬‫ﻣﺿﯾ‬‫ﻣن‬699،2‫ﺷﺑﻛﺔ‬.
‫ھذه‬‫اﻟﺷﺑﻛﺎت‬‫ﺗﻘﻊ‬‫ﻓﻲ‬108‫دول‬‫ﻣﺧﺗﻠﻔﺔ‬.‫ﻣﺎ‬‫ﯾﻘرب‬‫ﻣن‬‫ﻧﺻف‬‫اﻟﮭﺟﻣﺎت‬‫ھﻲ‬Windows
RPC‫و‬SQLSlammer.‫ﺗم‬‫ﺗوزﯾﻊ‬‫اﻟﮭﺟﻣﺎت‬‫ﺑﺎﻟﺗﺳﺎوي‬‫إﻟﻰ‬‫ﺣد‬‫ﻣﺎ‬‫ﺑﻣرور‬‫اﻟوﻗت‬.‫ھﻧﺎك‬
‫اﻟﻣزﯾد‬‫ﻣن‬‫اﻟﮭﺟﻣﺎت‬‫ﻛﺎﻧت‬‫ﺳﺎﻋﺎت‬‫ﻏﯾر‬‫اﻟﻌﻣل‬‫وأﻛﺛر‬‫ﻣن‬50٪‫ﻣن‬‫اﻟﮭﺟﻣﺎت‬‫أﯾﺎم‬‫اﻷﺣد‬‫واﻻﺛﻧﯾن‬
‫واﻟﺛﻼﺛﺎء‬‫اﻟوﻗت‬‫اﻟﻘﯾﺎﺳﻲ‬.‫وﻣﻊ‬‫ذﻟك‬،‫ﺑﺳﺑب‬‫اﻻﺧﺗﻼﻓﺎت‬‫ﻓﻲ‬‫اﻟﻣﻧطﻘﺔ‬‫اﻟزﻣﻧﯾﺔ‬‫ﻧﺷﺄت‬53٪‫ﻣن‬
‫ﺟﻣﯾﻊ‬‫ھﺟﻣﺎت‬‫اﻟﺻﯾن‬‫ﺧﻼل‬‫وﻗت‬‫ﻣﺗﺄﺧر‬‫ﻣن‬‫ﻟﯾﻠﺔ‬‫اﻟﺟﻣﻌﺔ‬‫ﺣﺗﻰ‬‫اﻟﺳﺑت‬‫ﺣواﻟﻲ‬‫ﻧﺻف‬‫اﻟﮭﺟﻣﺎت‬
‫ﺷﺎﺋﻌﺔ‬‫ھﺟﻣﺎت‬Windows RPC‫و‬SQL Slammer.‫ﺟﺎءت‬‫أﻗل‬‫ﻣن‬‫ﻧﺻف‬‫اﻟﮭﺟﻣﺎت‬
‫ﺑﻘﻠﯾل‬‫ﻋﺷر‬‫ﺷﺑﻛﺎت‬‫وﺣواﻟﻲ‬25٪‫أﺗوا‬‫ﻣن‬‫ﻋﺷرة‬‫ﻣﺿﯾﻔﯾن‬.
‫ھذا‬‫اﻟﺗﺣﻠﯾل‬‫ھو‬‫ﻣﻌﻠوﻣﺎت‬‫ﻗﯾﻣﺔ‬‫ﻟﻣﻘدﻣﻲ‬‫ﺧدﻣﺎت‬
‫اﻹﻧﺗرﻧت‬‫واﻟﺑﺎﺣﺛﯾن‬‫ﻟﻠﺷرﻛﺎت‬‫اﻟﺻﻐﯾرة‬.
‫اﻟﻣﻌﻠوﻣﺎت‬‫ﯾﻘدم‬‫ھﻧﺎ‬ً‫ﻼ‬‫دﻟﯾ‬‫ﺎ‬ً‫ﻌ‬‫ﻗﺎط‬‫ﻋﻠﻰ‬‫اﻟﺣﺎﺟﺔ‬‫إﻟﻰ‬
‫ﺟدار‬‫ﺣﻣﺎﯾﺔ‬‫وﺣﻣﺎﯾﺔ‬‫ﻟﻠﺷﺑﻛﺔ‬‫وﯾﺳﺎﻋد‬‫ﻣﺳؤوﻟو‬
‫اﻟﺷﺑﻛﺎت‬‫ﻋﻠﻰ‬‫اﻟﻣﺟﺎﻻت‬‫اﻟﺗﻲ‬‫ﺗﺷﻛل‬‫ﺗﮭدﯾدات‬
‫ﻣﻌﯾﻧﺔ‬.‫ﻋﻠﻰ‬‫ﺳﺑﯾل‬‫اﻟﻣﺛﺎل‬،‫اﻟﺷﺑﻛﺔ‬
‫ﻗد‬‫ﯾﺧﺗﺎر‬‫اﻟﻣﺳؤول‬‫ﻓرض‬‫إﺟراءات‬‫أﻣﺎن‬‫إﺿﺎﻓﯾﺔ‬
‫ﻓﻲ‬‫ﻣﻧﻊ‬Windows RPC‫وھﺟﻣﺎت‬SQL Slammer‫ﺑﺎﻹﺿﺎﻓﺔ‬‫إﻟﻰ‬‫ذﻟك‬،‫ﻣن‬‫اﻟﺗﺣﻠﯾل‬،
‫ﻗد‬‫ﯾﺧﺗﺎر‬‫اﻟﻣﻼك‬‫ﺗوظﯾف‬‫اﻟﻣزﯾد‬
‫اﻟﻣوارد‬ ‫ﻣن‬‫ﺧﻼل‬‫ﺳﺎﻋﺎت‬‫اﻟﻌﻣل‬‫ﻏﯾر‬‫اﻟﻌﺎدﯾﺔ‬‫ﺧﻼل‬‫أﯾﺎم‬‫اﻷﺣد‬‫واﻹﺛﻧﯾن‬‫واﻟﺛﻼﺛﺎء‬.
‫ﯾﻣﻛن‬‫ﺗﺣﺳﯾن‬‫اﻟدراﺳﺔ‬‫إذا‬‫ﺗم‬‫ﺗﺣدﯾد‬‫اﻟﻣﺗﺳﻠﻠﯾن‬‫ﺑﺷﻛل‬‫أﻓﺿل‬.‫ﻋﻠﻰ‬‫اﻟرﻏم‬‫ﻣن‬‫وﺟود‬IP‫ل‬
،‫اﻟﻣﺻدر‬‫ﻟﯾس‬‫ﻣن‬‫اﻟﻣﻌروف‬‫ﻣﺎ‬‫إذا‬‫ﻛﺎن‬‫ھذا‬‫ھو‬IP‫اﻟﻔﻌﻠﻲ‬.‫ﻟﻠﻣﮭﺎﺟم‬
.‫ﺗطوﯾره‬ ‫وﻣﺗﺎﺑﻌﮫ‬ ‫ﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫وﺟود‬ ‫اھﻣﯾﺔ‬ ‫ﻣدي‬ ‫اﻟدراﺳﺔ‬ ‫ھذه‬ ‫ﻟﻧﺎ‬ ‫ﻓﺗوﺿﺢ‬
5. Data collection and sampling
‫ﺗ‬‫م‬‫اﻗﺗراح‬‫ﻣن‬ ‫ﻣﺧﺗﻠﻔﺔ‬ ‫أﻧواع‬ ‫ﻟﺗﻘﯾﯾم‬ ‫ﺗﻘﯾﯾم‬ ‫ﻣﻧﮭﺟﯾﺔ‬‫ﻣن‬ .‫واﻷﻣن‬ ‫اﻷداء‬ ‫ﺣﯾث‬ ‫ﻣن‬ ‫اﻟﻧﺎرﯾﺔ‬ ‫اﻟﺟدران‬
‫وﻣﻊ‬ ‫آﻣﻧﺎ‬ ‫ﯾﻛون‬ ‫أن‬ ‫داﺋﻣﺎ‬ ‫ﻓﯾﮫ‬ ‫اﻟﻣرﻏوب‬‫أن‬ ‫ﯾﻣﻛن‬ ، ‫ﻟﻠﮭﺟوم‬ ‫اﻟﻣﻘﺎوﻣﺔ‬ ‫اﻟﻧﺎرﯾﺔ‬ ‫اﻟﺟدران‬ ‫ﻓﺈن‬ ‫ذﻟك‬
‫اﻟﯾوم‬ ‫اﻹﻧﺗرﻧت‬ ‫ﺗطور‬ ‫ﻣﻊ‬ .‫ﻗﻠق‬ ‫ﻣﺻدر‬ ‫اﻷداء‬ ‫ﺗدھور‬ ‫ﯾﻛون‬‫اﻟوﺳﺎﺋط‬ ‫ﻟﺗطﺑﯾق‬ ‫اﻟﻣﻛﺛف‬ ‫واﻻﺳﺗﺧدام‬
‫ﻗﺑل‬ ‫ﻣن‬ ‫اﻟﻣﺗﻌددة‬.‫اﻟﻣﺳﺗﺧدﻣﯾن‬
‫ظروف‬ ‫ﺗﺣت‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﻟﺟدار‬ ‫اﻟﺧدﻣﺔ‬ ‫ﺟودة‬ ‫أداء‬ ‫اﺧﺗﺑﺎر‬ ‫ﯾﺗم‬ ، ‫اﻟﺑداﯾﺔ‬ ‫ﻓﻲ‬ .‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫ﻟﺗﻘﯾﯾم‬
‫ﻣﺧﺗﻠﻔﺔ‬،‫ﺛ‬‫ھﺟ‬ ‫ﻋدة‬ ‫ﺑﻌد‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫أﻣن‬ ‫ﺗﻘﯾﯾم‬ ‫ﯾﺗم‬ ‫م‬،‫ﻣﺎت‬‫ﻋدة‬ ‫ﺑﻌد‬ ‫اﻟﺣﻣﺎﯾﺔ‬ ‫ﺟدار‬ ‫أﻣن‬ ‫ﺗﻘﯾﯾم‬ ‫ﯾﺗم‬ ‫ﺛم‬
‫ھﺟﻣﺎت‬.
Firewall ..
Firewall ..
Firewall ..
Firewall ..
Firewall ..
Firewall ..
Firewall ..
Firewall ..
Firewall ..
Firewall ..

More Related Content

Recently uploaded

FAIL REKOD PENGAJARAN.pptx fail rekod pengajaran
FAIL REKOD PENGAJARAN.pptx fail rekod pengajaranFAIL REKOD PENGAJARAN.pptx fail rekod pengajaran
FAIL REKOD PENGAJARAN.pptx fail rekod pengajaransekolah233
 
TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...
TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...
TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...Nguyen Thanh Tu Collection
 
مختصر علم احكام القرآن فقه القرآن وفق منهج العرض
مختصر علم احكام القرآن فقه القرآن وفق منهج العرضمختصر علم احكام القرآن فقه القرآن وفق منهج العرض
مختصر علم احكام القرآن فقه القرآن وفق منهج العرضأنور غني الموسوي
 
TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...
TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...
TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...Nguyen Thanh Tu Collection
 

Recently uploaded (6)

FAIL REKOD PENGAJARAN.pptx fail rekod pengajaran
FAIL REKOD PENGAJARAN.pptx fail rekod pengajaranFAIL REKOD PENGAJARAN.pptx fail rekod pengajaran
FAIL REKOD PENGAJARAN.pptx fail rekod pengajaran
 
TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...
TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...
TUYỂN TẬP 25 ĐỀ THI HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2023 CÓ ĐÁP ÁN (SƯU...
 
مختصر علم احكام القرآن فقه القرآن وفق منهج العرض
مختصر علم احكام القرآن فقه القرآن وفق منهج العرضمختصر علم احكام القرآن فقه القرآن وفق منهج العرض
مختصر علم احكام القرآن فقه القرآن وفق منهج العرض
 
Energy drink .
Energy drink                           .Energy drink                           .
Energy drink .
 
TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...
TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...
TUYỂN TẬP 20 ĐỀ THI KHẢO SÁT HỌC SINH GIỎI MÔN TIẾNG ANH LỚP 6 NĂM 2020 (CÓ Đ...
 
LAR MARIA MÃE DE ÁFRICA .
LAR MARIA MÃE DE ÁFRICA                 .LAR MARIA MÃE DE ÁFRICA                 .
LAR MARIA MÃE DE ÁFRICA .
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Firewall ..