Saturday, August 21, 2010

Internet Security

In building construction, a firewall is a structure designed to integrate building fires. For example, an attic crawlspace that covers the entire length of the building would concede a fire to roar from one end of the building to the other. Breaking up the crawlspace with non-flammable walls helps to slow the disseminate of a fire.


Network firewalls have a similar function. A firewall is a network security strategy, either a program or a truly device, that breaks up a network to comprise viruses and hackers.


Imagine two large fish tanks side by side, separated by a wall. We want to grant the blue fish to mingle, but we need to keep the carnivorous fish on the left away from the baby fish on the right. If we opened a computer-controlled door in the wall, programmed to only grant blue fish to pass but no one else, that would be a fishtank firewall.


Network firewalls 'segment" the network. Local traffic—the info that moves amongst the computers in that segment—doesn't go through the firewall to the more spectacular network outside. And selective information that doesn't must reach anyone inside the firewall is blocked out, precisely like the carnivorous fish in our example.


A Proxy is yet another network security tool. Proxies are replacements for Internet servers. When a computer requests a internet-location from the world wide web, a main hub provides the IP address. A firewall can interfere with this, and announce that no one inside the firewall may surf the Internet. The Proxy is then the "official" way past the firewall.


A proxy server has a list of "authorized" web sites. When the user's computer requests the address from the Internet, the proxy checks it versus the list, and whether or not the internet-site is approved, it authorizes the firewall to let the traffic through. Whether or not the internet-location is not approved, then the firewall sends a message saying "you aren’t authorized to visit this internet-location. "

24bicycles

No comments:

Post a Comment