What is firewall?


Information security is commonly thought of as a process and not a product. However, standard security implementations usually employ some form of dedicated mechanism to control access privileges and restrict network resources to users who are authorized, identifiable, and traceable. Red Hat Linux includes several powerful tools to assist administrators and security engineers with network-level access control issues.

Gateway that limits access between networks in accordance with local security policy. A system, designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or living the Internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

                                                                                                                                                                                                                ————————— Thanks


About Author


Leave A Reply

Powered by themekiller.com