wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall

profile
Akshay Goswami
Jul 08, 2022
0 Likes
1 Discussions
120 Reads

A firewall provides protection from external internet attackers by protecting your computer or network from malicious or unwanted network traffic. Firewalls can also prevent malicious software from accessing a computer or network over the Internet. Firewalls can be configured to block data from specific locations (i.e., computer network addresses), applications, or holes while allowing relevant and required data.
A firewalls filter network traffic within a private network. Analyzes which traffic should be allowed or restricted based on a set of rules. Think of a security program as a security guard on your computer's access point that only allows trusted sources, or IP addresses, to access your network.
Firewall only accepts incoming traffic prepared to receive. It distinguishes between good and bad traffic and allows or blocks certain data packets in pre-set security rules.
A firewall can be software or hardware. Software firewall programs are installed on each computer, and they control network traffic through applications and port numbers. Meanwhile, a hardware firewall is a device set up between a gateway and your network.
To improve our firewall security: Constantly update your firewalls as soon as possible, Use antivirus protection, Limit accessible ports and host.


Comments ()


Sign in

Read Next

What is 'Multi-core and Multi-threading' ?

Blog banner

What is a Malware ?

Blog banner

Virus

Blog banner

Memory Management

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

BUFFER OVERFLOW_142

Blog banner

INTERRUPTS

Blog banner

Data Exfiltration

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

What is Data, Information and Knowledge?

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Developments in Modern Operating Systems

Blog banner

E-security systems | CCTV

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Modern operating system

Blog banner

Drawing tips for a beginner

Blog banner

computer security

Blog banner

Importance Of Education.

Blog banner

Evolution of Operating System

Blog banner

Email Privacy

Blog banner

OS Assignment 1

Blog banner

Shoulders

Blog banner

Uber

Blog banner

The Sunny Side of Instagram

Blog banner

Os(Computer security threats)

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Virtual Machine's

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

I/O Management and Disk Scheduling

Blog banner

Modern Operating system

Blog banner

INTRANET

Blog banner

Supervised and unsupervised learning

Blog banner

A True Friendship

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Digital Marketing

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Deadlock

Blog banner

Concurrency management in operating systems

Blog banner

Mesh Topology

Blog banner

Modern Operating System

Blog banner