<p><i>In this video, Informa TechTarget managing editor Kate Murray explains the different kinds of firewalls and how they are used to combat cyberthreats.</i></p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Firewalls stop threats at the perimeter.</p>
<p>The term <i><a href=”https://www.techtarget.com/searchsecurity/definition/firewall”>firewall</a></i> was first used in construction, referring to a brick wall designed to stop fire from spreading in a building. In computer networking, a firewall works similarly: It stops external threats from entering a network.</p>
<p>Firewalls can be physical hardware, software, software as a service or even virtual private clouds. Considered an essential component of network security, they are used in both personal and enterprise settings.</p>
<p>Here, we’ll cover the basics of firewalls and how they work.</p>
<p>A firewall is placed somewhere along a network connection, most commonly between an internal and external network — like the internet.</p>
<p>As external data tries to enter an internal network, the firewall inspects its <a href=”https://www.techtarget.com/searchnetworking/definition/packet”>packet</a> information, including its source and destination address. It compares it against a set of preconfigured rules to determine if it’s benign or malicious traffic.</p>
<p>If the data abides by the rule set, it can pass through the firewall and enter the internal network. If it doesn’t, the data packet is blocked from entering.</p>
<p>Some common applications of firewalls include the following:</p>
<ul class=”default-list”>
<li><a href=”https://www.techtarget.com/searchsecurity/definition/access-control”>Access control</a>, like a school network blocking social media sites for students or an enterprise network blocking objectionable websites that aren’t suitable for work.</li>
<li>Threat defense, which blocks <a href=”https://www.techtarget.com/searchsecurity/definition/malware”>malware</a> attacks or hacking attempts from the outside.</li>
<li>Logging a
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: