Firewall
A firewall is a device or set of devices configured to permit, deny, encrypt, or proxy all computer traffic between different security domains based upon a set of rules or other criteria.
A firewall is a dedicated appliance, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
A firewall's function within a network is similar to firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.
Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.
Viruses Defenses
The threat from viruses changes constantly. More than 300 new viruses are discovered each month. To make Matters worse, today’s most prevalent threats are worms and mass-mailing viruses that can spread around the world In a matter of hours. To effectively combat the ever-changing virus threat, Various Companies establish an active anti-virus policy. Most companies today understand the need for virus protection. Many have established formal policies defining what form that protection should take, and how it should be used. Today most companies update antivirus software
Security Codes
For security of information system Password system is used. First an end user logs on to the computer system by entering his or her unique identification code or user ID. The end user is then asked to enter a password in order to gain access into the system. Next to access an individual file a unique file name must be entered. Password protects data from unauthorized use.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment