traffic filtering methods structure and functionality
functionality
the firewall that compares each outgoing
and incoming network packet to a set of
established rules such as the allowed ip
addresses ip protocols port number and
other aspects of the packet is known as
a packet filtering firewall
if the incoming network traffic is not
per the predefined rules that traffic is blocked
blocked
a variant of the packet filtering
firewall is the stateful inspection firewall
firewall
these types of firewalls not only
examine each network packet but also
checks whether or not that network
packet is part of an established network connection
connection
such firewalls are also referred to as
dynamic packet filtering firewalls
our next type of firewall is called a
proxy firewall
this draws close comparison to how you
give proxy attendance for a friend like
how you take the authority to represent
your friend the proxy firewall pretends
to be you and interacts with the internet
internet
they come between you and the internet
and thereby prevents direct connections
this protects your device's identity and
keeps the network safe from potential attacks
attacks
only if the incoming data packet
contents are protected the proxy
firewall transfers it to you they are
also known as application level gateway
the firewall can spot malicious actions
and block your computer from receiving
data packets from harmful sources in
addition to preventing cyber attacks
firewalls are also used in educational
institutions and offices to restrict
users access to certain websites or
applications it is used to avoid access
to unauthorized content
so here's a question for you which
firewall is also known as application
level gateway
a proxy firewalls b stateful inspection firewalls
firewalls
c packet filtering firewalls d dynamic
packet filtering firewalls
do give it a thought and leave your
answers in the comments section below
three lucky winners will receive amazon
gift vouchers
cyber crimes are today making headlines
every day
and individuals and companies must do
everything possible to secure their information
information
hence using security devices that help
safeguard our networks from falling prey
to deadly cyber attacks is the need of
the hour
we hope you enjoyed this video if you
did a thumbs up would be really
appreciated here's your reminder to
subscribe to our channel and click on
the bell icon for more on the latest
technologies and trends thank you for
watching and stay tuned for more from
simply learn [Music]
Clicca su qualsiasi testo o timestamp per andare direttamente a quel momento del video
Condividi:
La maggior parte delle trascrizioni è pronta in meno di 5 secondi
Copia in un clicOltre 125 lingueCerca nel contenutoVai ai timestamp
Incolla l'URL di YouTube
Inserisci il link di qualsiasi video YouTube per ottenere la trascrizione completa
Modulo di estrazione trascrizione
La maggior parte delle trascrizioni è pronta in meno di 5 secondi
Installa la nostra estensione per Chrome
Ottieni le trascrizioni all'istante senza uscire da YouTube. Installa la nostra estensione per Chrome e accedi con un clic alla trascrizione di qualsiasi video direttamente dalla pagina di riproduzione.