Preview

JIET BTech Seminar Report Format II

Good Essays
Open Document
Open Document
2268 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
JIET BTech Seminar Report Format II
INTRODUCTION

In this seminar I am going to telling about ‘Firewall’ and ‘Proxy’ . Firewalls are network security tools that operate between the connection of an organization’s internal and the external network.

My reason to choose this domain for seminar is that every day we use internet too much time and we all know what firewall and proxy do but many user don’t know how it is work and how firewall protect our PC. But I think we should know about firewall because we are using it daily so I want to tell a basic introduction about Firewall and Proxy and Gain a better understanding of what a firewall is ?

The scope of this domain is in this days unautorized data access using internet called as “Hacking” is increasing contineuesly so to prevent this thing all servers and workstation using Firewall. In all OS, a firewall are installed to prevent attacks and control the flow of traffic into and out-of a network. Firewall is usually software running on a server or workstation. An edge firewall protects a single computer from attacks directed against it. Proxy is that Address seen by the external network is the address of the proxy for example VPN is also a proxy Used to connect two private networks via the internet.

Going back through history, one can infer that the concept of keeping out attackers and intruders is thousands of years old. The Great Wall that the Chinese empire built almost two thousand years ago, served this kind of concept keeping foreigners outside these walls. Furthermore, a building that one can meet more commonly in the European area is the castle. Castles firstly appeared in the middle ages and they were concealed by high walls that were able to confront enemy armies and invaders. This concept of concealing an area of great interest finds great implementation in network security in a more modern setting with the use of firewalls.
Firewalls are network security tools that operate between the connection of an organization’s internal and the

You May Also Find These Documents Helpful

  • Powerful Essays

    3. Given that the Ubuntu internal firewall is not installed by default, should you enable this firewall if your organization already has a firewall? Why or why not?…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1110 Module5 Lab

    • 254 Words
    • 2 Pages

    Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    5) Firewall: A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Firewall configuration: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    The basics of using a proxy server for privacy and security - TechRepublic. (n.d.). Retrieved…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Fnce 601 Study Notes

    • 501 Words
    • 3 Pages

    • Isolation of the organization's private network from the Internet by using a firewall and proxy server.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Case Study: Bibliofind

    • 987 Words
    • 4 Pages

    Firewalls need to be placed at a company’s Internet entry point as a first layer of protection in a company’s IT security system, so, however many entry points, Bibliofind may have had, they should have had a firewall installed on each one. A firewall could have helped Bibliofind in preventing crackers from accessing their network and their customers personal data, but may not have eliminated it altogether; firewalls use a combination of tools, including encryption, and intrusion detection systems which are the next layers of protection.…

    • 987 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    History of Firewall

    • 254 Words
    • 2 Pages

    There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates.…

    • 254 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In response to society’s initial disbelief, FireEye proved its products’ efficacy to the market. The test was to install the FireEye product behind the clients’ own firewalls to see whether existing security products were letting…

    • 2030 Words
    • 9 Pages
    Better Essays
  • Good Essays

    What is firewall? - security software: a piece of computer software intended to prevent unauthorized access to system software or data…

    • 753 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advantage, it is essential. Yet connecting a private network to the Internet can expose critical or confidential data to malicious attack from anywhere in the world. Users who connect their computers to the Internet must be aware of these dangers, their implications and how to protect their data and their critical systems. Firewalls can protect both individual computers and corporate networks from hostile intrusion from the Internet, but must be understood to be used correctly.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    firewall

    • 1124 Words
    • 5 Pages

    Traditionally, a firewall is defined as any device (or software) used to filter or control the flow of traffic. Firewalls are typically implemented on the network perimeter, and function by defining trusted and untrusted zones…

    • 1124 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Usage of Firewall and Proxy helps in protecting the computer network and increases the security by blocking unauthorized users to access and therefore which in turn maintains the business continuity.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays