How does a firewall protect, Computer Networking

How Does a Firewall Protect

Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information to the network can be controlled. A proxy is an application program that permits or forbids access by accepting or rejecting requests sent to it. Only valid users can log in and pass through a proxy service. It works on the Application level of the OSI model . Another technique that can be used is Encryption. A firewall may also combine encryption to provide confidentiality and authenticity. However this feature never works alone but is always combined with one of the above methods.

Posted Date: 9/13/2012 5:42:55 AM | Location : United States







Related Discussions:- How does a firewall protect, Assignment Help, Ask Question on How does a firewall protect, Get Answer, Expert's Help, How does a firewall protect Discussions

Write discussion on How does a firewall protect
Your posts are moderated
Related Questions
What is difference between baseband and broadband transmission? In a baseband transmission, the whole bandwidth of the cable is consumed by a one signal. In broadband transmiss

User Server Interaction Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship

Q. Why congestion occurs? Congestion Emerge if the load on the network is greater than the capacity of the network - Load that is the number of packets sent to the net

Parallel Construct The syntax of the parallel construct is as follows: #pragma omp parallel [set of clauses]  where clause is one of the following:  structured-block if(sca

Wireless Ethernet (802.11) a) Operates on physical plus data link layers b) BSS (Basic service set) stationary or mobile wireless stations and a central base station known a

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

State about the Single Sign-On Intranet This Intranet, if managed efficiently, allows maximum security by firewalling anyone from inappropriate sites automatically. For exam

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b

What is VRC? It is the most common and least costly mechanism for Error Detection. In VRC, a parity bit is added to each data unit so that the total number of 1s becomes even f