How does a firewall protect, Computer Networking

How Does a Firewall Protect

Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information to the network can be controlled. A proxy is an application program that permits or forbids access by accepting or rejecting requests sent to it. Only valid users can log in and pass through a proxy service. It works on the Application level of the OSI model . Another technique that can be used is Encryption. A firewall may also combine encryption to provide confidentiality and authenticity. However this feature never works alone but is always combined with one of the above methods.

Posted Date: 9/13/2012 5:42:55 AM | Location : United States







Related Discussions:- How does a firewall protect, Assignment Help, Ask Question on How does a firewall protect, Get Answer, Expert's Help, How does a firewall protect Discussions

Write discussion on How does a firewall protect
Your posts are moderated
Related Questions
Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

Q. Show Ethernet Media standard? - The cables and connector specifications utilized to support Ethernet implementations are derived from the EIA/TIA (Electronic Industries Asso

Sharing  information  To understand  how distance vector routing  works examine the  internet shown in  the  clouds represents local  area network . the  number  inside each c

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

Can you define how L2F data tunneling process works?

What is OSPF? It is an Internet routing protocol that scales well, can route traffic with multiple paths, and uses knowledge of an Internet's topology to make precise routing de

Advantages and Disadvantage of Computer Networking Most of the benefits  of networking  can be  divided into  two  generic categories Connectivity and  sharing. Networks

The following issues are decided by the system in the process of message passing: 1) Whether the communication link is established or not 2) Whether the receiver is ready to

Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i