In addition, enterprises may need more than one of the five firewalls to better secure their systems. This article somewhat arbitrarily argues that there are five key types of firewalls that use different mechanisms to identify and filter out malicious traffic, but the exact number of options is not nearly as important as the idea that different kinds of firewall products do rather different things. Along the way, the firewall has evolved into different types of firewalls. The term has grown gradually in familiar usage to the point that no casual conversation about network security can take place without at least mentioning it. In the networking case, the idea was to insert a filter of sorts between the ostensibly safe internal network and any traffic entering or leaving from that network's connection to the broader internet. The name was a metaphor, likening the device to partitions that keep a fire from migrating from one part of a physical structure to another. Steven Bellovin, then a fellow at AT&T Labs Research and currently a professor in the computer science department at Columbia University, is generally credited - although not by himself - with first using the term firewall to describe the process of filtering out unwanted network traffic. There was destined to be some sort of process that looked at network traffic for clear signs of incidents. The firewall traces back to an early period in the modern internet era when systems administrators discovered their network perimeters were being breached by external attackers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |