Principles of Information Security
Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
Question
Book Icon
Chapter 6, Problem 10RQ
Program Plan Intro

Firewall:

A firewall is security software which imposes a set of protocols to prevent specific types of data from moving among trusted and untrusted level of networks.

  • Types of firewalls that are commonly used as follows:
    • Application layer proxy firewalls
    • Hybrid firewalls
    • Packet filtering firewalls
    • Media access control layer firewalls

Hybrid Firewall:

It combines the structures and utilities from above types of firewalls. It is mainly used to protect user’s servers and workstations from malicious problems and illegal access.

  • “Unified Threat Management (UTM)” is one of the separate types of hybrid firewalls.

Blurred answer
Students have asked these similar questions
In the threat assessment, what is the difference between capacity and capability?
How precisely can a security framework help in the planning and implementation of a security infrastructure? As compared to other forms of governance, information security governance stands out due to its unique characteristics. Is there a person or group inside the company who should be responsible for making contingency plans?
A. What conditions must be met to ensure that risk acceptance has been used properly? B. Discuss the concept of an organisation’s competitive advantage against competitors and how it has evolved over the years with the ongoing development of the IT industry. C. Explain why networking components need more examination from an information security perspective than from a systems development perspective. Why must this practice be periodically reviewed? D. With the aid of a diagram, discuss the contingency planning hierarchy. E. What is the DMZ? Discuss whether this is a good name for the function that this type of subnet performs.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,