How does a firewall protect, Computer Networking

How Does a Firewall Protect

Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information to the network can be controlled. A proxy is an application program that permits or forbids access by accepting or rejecting requests sent to it. Only valid users can log in and pass through a proxy service. It works on the Application level of the OSI model . Another technique that can be used is Encryption. A firewall may also combine encryption to provide confidentiality and authenticity. However this feature never works alone but is always combined with one of the above methods.

Posted Date: 9/13/2012 5:42:55 AM | Location : United States







Related Discussions:- How does a firewall protect, Assignment Help, Ask Question on How does a firewall protect, Get Answer, Expert's Help, How does a firewall protect Discussions

Write discussion on How does a firewall protect
Your posts are moderated
Related Questions
Need for standards - Over the past couple of decades several of the networks that were built used different hardware and software implementations therefore they were incompatib

Systolic Array : This interconnection network is a kind of pipelined array architecture and it's intended for multidimensional flow of data. It is used for applying fixed algorithm

Q. What do you mean by Substitutional Ciphers? Substitutional Ciphers Monoalphabetic Substitution Polyalphabetic Substitution - Transpositional - character

Full form of HTTPd It stands for HTTP daemon. HTTPd is the program run on a UNIX platform to establish a Web server. On other platforms, such as Microsoft Windows NT, the We

The Network Control Unit (NCU) is a field panel housing electronic modules, terminal blocks, and signal conditioners (pneumatic, linevoltageand electronic) all inside a one enclosu

Q Illustrate Return to Zero encoding? - In NRZ-I long strings of 0s may still be a problem - May comprise synchronization as part of the signal for both 1s and 0s - How?

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Network Topologies Topology is study  of the  arrangement or  mapping of  the elements links nodes etc,  of a network especially the physical and logical inter connections bet

Tools for Digital Sound Sound is the oscillation of pressure that propagates in the form of a wave. Sound waves are transmitted through some medium (solid, liquid, or gas); th

Introduction An algorithm is defined as a series of computational steps required to accomplish an exact task. The algorithm works for a given input and will terminate in a well