How does a firewall protect, Computer Networking

How Does a Firewall Protect

Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information to the network can be controlled. A proxy is an application program that permits or forbids access by accepting or rejecting requests sent to it. Only valid users can log in and pass through a proxy service. It works on the Application level of the OSI model . Another technique that can be used is Encryption. A firewall may also combine encryption to provide confidentiality and authenticity. However this feature never works alone but is always combined with one of the above methods.

Posted Date: 9/13/2012 5:42:55 AM | Location : United States







Related Discussions:- How does a firewall protect, Assignment Help, Ask Question on How does a firewall protect, Get Answer, Expert's Help, How does a firewall protect Discussions

Write discussion on How does a firewall protect
Your posts are moderated
Related Questions
Reliability is the probability of success ; where success is defined as compliance to specified requirements. A system or an item is considered reliable if it performs satisfactori

The compression protocols for PPP are:- A. Stac   B. Predictor

The bitonic sorting network needed log n number of stages for performing the task of sorting the list. The first n-1 stages of the circuit are able to sort two n/2 numbers and the

Fully connected : It is the most powerful interconnection topology.  In this every node is directly associated to all other nodes. The limitation of this network is that it needs t

Q. What do you understand by Protocol? Ans:  In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers interchange infor

Determine about the Internet The Internet as a source of information and reference material, browsing the World Wide Web (WWW) and Newsgroups for the latest gossip or sh

what are the terms CSU, DSU and TSU?

FDDI has four specifications: 1. Media Access Control it defines how the medium is accessed 2. Physical Layer Protocol it defines data encoding/decoding procedures 3. Phy

TCP Connection Management TCP connection management encompasses the procedures for establishing and  terminating connection (FTCP is  connection oriented protocols). In TCP c

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex