An explanation of firewall types and uses

<p><i>In this video, Informa TechTarget managing editor Kate Murray explains the different kinds of firewalls and how they are used to combat cyberthreats.</i></p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Firewalls stop threats at the perimeter.</p>
<p>The term <i><a href=”https://www.techtarget.com/searchsecurity/definition/firewall”>firewall</a></i> was first used in construction, referring to a brick wall designed to stop fire from spreading in a building. In computer networking, a firewall works similarly: It stops external threats from entering a network.</p>
<p>Firewalls can be physical hardware, software, software as a service or even virtual private clouds. Considered an essential component of network security, they are used in both personal and enterprise settings.</p>
<p>Here, we’ll cover the basics of firewalls and how they work.</p>
<p>A firewall is placed somewhere along a network connection, most commonly between an internal and external network — like the internet.</p>
<p>As external data tries to enter an internal network, the firewall inspects its <a href=”https://www.techtarget.com/searchnetworking/definition/packet”>packet</a> information, including its source and destination address. It compares it against a set of preconfigured rules to determine if it’s benign or malicious traffic.</p>
<p>If the data abides by the rule set, it can pass through the firewall and enter the internal network. If it doesn’t, the data packet is blocked from entering.</p>
<p>Some common applications of firewalls include the following:</p>
<ul class=”default-list”>
<li><a href=”https://www.techtarget.com/searchsecurity/definition/access-control”>Access control</a>, like a school network blocking social media sites for students or an enterprise network blocking objectionable websites that aren’t suitable for work.</li>
<li>Threat defense, which blocks <a href=”https://www.techtarget.com/searchsecurity/definition/malware”>malware</a> attacks or hacking attempts from the outside.</li>
<li>Logging a

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: