How does a firewall protect, Computer Networking

How Does a Firewall Protect

Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information to the network can be controlled. A proxy is an application program that permits or forbids access by accepting or rejecting requests sent to it. Only valid users can log in and pass through a proxy service. It works on the Application level of the OSI model . Another technique that can be used is Encryption. A firewall may also combine encryption to provide confidentiality and authenticity. However this feature never works alone but is always combined with one of the above methods.

Posted Date: 9/13/2012 5:42:55 AM | Location : United States







Related Discussions:- How does a firewall protect, Assignment Help, Ask Question on How does a firewall protect, Get Answer, Expert's Help, How does a firewall protect Discussions

Write discussion on How does a firewall protect
Your posts are moderated
Related Questions
Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends

A communication protocol is an agreement which specifies a common language two computers use to exchange messages. For instance, a protocol denotes the exact format and meaning of

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Design the user interface for mode switching and data entry any way that you like. For example, to switch an application from transmit mode to receive mode, you can give it special

DLCI stands for Data Link Connection Identifier. It identifies the local PVC.

Communication, Resource sharing and Media (When many host share their resources with every other OR when many devices connect with each other for resource sharing )

Question: (a) (i) Distinguish between Physical topology and Logical topology. (ii) Explain the following statement with the help of a diagram: "A star topology can have a l

Q. Error Detection-General? Sender transmits every data unit twice Receiver performs bit-by-bit comparison between those two versions of data. Any mismatch would

What are the functions of the typical server program? It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiate