Thursday, September 6, 2007

Firewall As Security Wall For Computer Protection

Firewalls are security programs for computers that work same as that of physical firewalls protecting them from external hazards things. If an organization is using a network based environment then there is more chance of getting harm then a stand alone computer. So it is strictly recommended that there should be some security measures that will allow only the permitted things to get in and push unwanted stuff outwards. Even if the home computers uses internet surfing then intruders can easily make home in your computer files. To avoid such harms and security problems, firewall concept is eve loved. This phenomenon works as just like of barrier to keep damaging forces away. Firewall works just near to the router program scanning out each packet coming to the destination whether it has to forward or not. Usually firewall programs are placed in the separate systems to avoid taking direct request at private network connections. A lot of firewall products are available in the market that are providing some interesting and useful features like

-Record keeping facility

-Generating reports on regular intervals

-Alarming facility on any attack

-GUI based system

Working of Firewall:

Firewall works on three principles which data is permitted to come in and which not. -Sorting out Packets

Data on the network is sent in the form packets from one computer to the other computer. So firewall is aiming at packets first, it starts filtering them and then send to the demanding computer and cast off all other packets.

-Proxy

Some proxy settings are done on the network computers by firewall programs. All the information coming from the internet resource is first checked by firewall then transmitted to the requested system.

-Assessment of Packets Content

Not whole of the content is checked by firewall programs but certain keywords are matched to the defined database information in the firewall. If keyword match found they packets are allowed inside the network otherwise they are discarded.

Blog Archive

Categories