What Is a Firewall ?

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

What Is a Firewall?

Firewalls are often categorized as either network firewalls or host-based firewall. Network firewalls filter traffic between two or more networks and run on network hardware. Host-based firewalls run on host computers and control network traffic in and out of those machines.

Firewalls may also be a component of your computer's operating system. For example - Windows Firewall is a Microsoft Windows application that notifies users of any suspicious activity. The Application can detect and block viruses, worms, and hackers from harmful activity.

Types of Firewalls :

Packet Filter :

Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.

Application Gateway :

Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.

Proxy Server :

It intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Circuit-level Gateway :

It applies security mechanisms when a connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Next Generation Firewall (NGFW) :

Work by filtering network and Internet traffic based upon the applications or traffic types using specific ports. Next Generation Firewalls (NGFWs) blend the features of a standard firewall with quality of service (QoS) functionalities in order to provide smarter and deeper inspection.



Crime on/Through the Internet

Crime on/Through the Internet (Cyber Crime, Crime Reasons & Crime Prevention) :

Any criminal activity that uses a computer either as an instrument, target, or a means for perpetuating further crimes comes within the ambit of "cyber crime".

Read More
Algorithm and Flowchart, Symbols in Flowcharts and Examples of flowcharts

Algorithm and Flowchart, Symbols in Flowcharts and Examples of flowcharts :

TCP/IP is an industry-standard protocol suit for Wide Area Networks (WANs) developed in the 1970s and 1980 by the U.S Department of Defense (DoD).

Read More
What is a bootstrap loader? The bootstrap process in Windows Operating System

What is a bootstrap loader? The bootstrap process in Windows Operating System :

Booting is a bootstrapping process that starts operating systems when the user turns on a computer. A Bootstrap Loader (BSL) is a small program but hard to code.

Read More

Computer Science Engineering

Special Notes

It's a special area where you can find special questions and answers for CSE students or IT professionals. Also, In this section, we try to explain a topic in a very deep way.

CSE Notes