what is a firewall?
what is a firewall, fire means a fire while the wall is the wall so it can be said in brief firewall is a wall of fire. why can say like that? firewall is the way data traffic originating from outside the software so that all types of data to be entered into the computer will bypass the firewall in advance whether the incoming data is safe or not for computers. it is also a firewall is used as a delimiter of a system of anyone who can log into the system. As for some of the functions of a firewall on a system:
1. regulating and controlling the traffic of incoming and outgoing dataThe first function is performed by the firewall should be able to control and regulate the traffic of incoming data into the system because if you can not set an error will occur on the incoming data and likely the data will be corrupted as well as fatal to the system used.
2. perform authentication on accessmeans that the firewall can authenticate users with passwords that are owned by the user, this method is often referred to as extended or xauth authentication. using this method is a user tries to connect first requested username and password and then when it's selected by the firewall will be allowed to enter the system. The second method is to use digital certificates and public key. The advantages of this method is the authentication process can occur without user intervention. In addition, this method is much faster in order to authenticate. However, this method is more complicated implementation because it requires many components such as public key infrastructure implementations.
3. protect the data in the softwareone of its functions is to protect the system in use, and protection can do super tight so that the incoming data does not damage the system on the network as well as to protect the host host is suspicious that go into our system. If a host is running a particular operating system that has not yet patched security holes connected to the Internet, the firewall may not be able to prevent the exploitation of the host by other hosts, especially if the exploit is using the traffic has been allowed by the firewall (in configuration). for example, a packet-inspection firewall allows HTTP traffic to a web server that runs a web service that has security holes that have not patched, then a user is "fun" can only make the exploit to undermine the web server because it will be a web server in question has security holes that have not patched
4. record all incidents and report to the administratorfirewall can record the data transmission that has been done by the system so that users can know what the incoming data packets and if the data is dangerous or not, as such a system would be safer if the firewall is always on the switch to keep the system instability that we use.
0 komentar:
Posting Komentar