• Tuesday May 24,2022

Firewall

We explain what a firewall is, what it is for and how this system works. In addition, the types that exist and the Windows firewall.

The firewall is a first step of defense in the world of computer networks.
  1. What is a firewall ?

In computer science, and more specifically in telecommunications, it is understood as a firewall (in English) or firewalls a system or device capable of allowing, limiting, Encrypt or decode communications traffic between a computer (or a local network) and the rest of the Internet, preventing unauthorized users or systems from accessing.

A firewall may well be physical or digital, that is, a device or piece of software, and in both cases it is only a first step of defense in the world of computer networks., indispensable but not sufficient to guarantee security against cyber attacks and third-party interference.

This type of technology takes its name from the mechanism for fire prevention that is usually applied in green areas or in vulnerable buildings, and which consists of a wall or a vacant area, free of any flammable content, which limits the indefinite expansion of fire in case of fire.

The precursors of the firewall arose during the 1980s, when the Internet was still a recent field of knowledge and had not yet been considered the margin of damage. or possible through hacking or cyber terrorism.

Since the first massive cyber attacks by viruses and digital worms at the beginning of the next decade, digital protection has been becoming extreme and perfecting, at the rate at which new ones appear pieces of harmful software, known as malware .

See also: Output Devices.

  1. What is a firewall for?

A firewall prevents the entry or exit of unauthorized communications.

A firewall simply serves to interrupt unauthorized or suspicious connections between a computer system or computer, and the Internet. In this way the remote communication between malicious users ( hackers ) and the local system is cut, or between pieces of malware installed furtively on the system and the outside of it, thus preventing it from operating as a spearhead in the cyber invasion.

It is therefore a guard who prevents the entry or exit of unauthorized or suspicious communications, based on discernment criteria that are updated from time to time.

  1. How does a firewall work?

Firewalls distinguish between permitted and dangerous or suspicious connections, based on different procedures, such as:

  • Firewall Policies Using the IP numbers and other identification systems, the firewall suspends any communication request that does not come from the internal network or from the system itself, disguising behind the internal IP the set of internal resources, so that no one can monitor them from outside.
  • Content filtering Through a system of exclusion rules in which the user can have the last word, the firewall distinguishes between problematic, suspicious or insecure content, and those that remain at the user's discretion. Thus, access to Web pages or entire servers can be blocked as a precaution.
  • Antimalware services . Many firewalls have built-in virus and malware definitions provided by various defensive programs, so as to also help to have the expansion of these pernicious programs.
  • IPR services . This is what the Deep Package Inspection (IPP or DPI) procedures are called: Deep Package Inspection ), which adds a second security layer to the system, reviewing the deep content of the information packets received.
  1. Firewall Types

The personal firewall is chosen and installed by the user.

There are the following types of firewall:

  • Gateway application level . Applies only for specific applications considered risky, such as FTP servers or free exchange of information between users (P2P). It is usually very effective, but imposes a reduction in system resources.
  • Gateway level circuit . Monitor the establishment of TCP or UDP connections through security sessions.
  • Network layer firewall . It operates based on the inspection of IP addresses and the exchange of IP packets, using alternate data such as the MAC address.
  • Application layer firewalls. It already operates based on applications, controlling its way of reaching the Internet, for example, by means of Proxys.
  • Personal firewall. Firewall chosen by the user and installed in the system to meet the individual requirements of system use.
  1. Windows firewall

The famous Microsoft operating system, called Windows, includes a firewall software among its auto defense options. This option was included in the System Security Center from its version XP Service Pack 2, seeking to offer greater control and defense of system stability for its users.

This firewall is updated together with the other Windows applications to keep up to date with regard to cyber threats, and it is activated automatically unless there is some other antivirus software or firewall that you have the connection administration privileges, in which case the Windows firewall will remain disabled.

Interesting Articles

Acceleration

Acceleration

We explain what is the acceleration and the formulas used to calculate it. In addition, its difference with speed and examples. The concept of acceleration comes from the studies of Isaac Newton. What is the acceleration? We call physical acceleration a vector magnitude (that is, endowed with direction) that the variation in the speed according to the time elapsed of an object which is in motion

Communication Barriers

Communication Barriers

We explain to you what are the communication barriers and the elements involved in your process. In addition, how to avoid these barriers. To communicate, the channel must be conducive to the transmission of a message. What are the barriers to communication? It is known as communication barriers to obstacles and difficulties that may arise during the communicative process and hinder the correct culmination of it or distort the original message

Illustration

Illustration

We explain to you what the Enlightenment is, the cultural and political movement of the 18th century, and what are its characteristics. Prominent figures. This time is also called the Age of Enlightenment. What is the illustration? The Enlightenment is a cultural and political movement known for bringing bright ideas to the dark society of the past

Spam

Spam

We explain what Spam is and for what purpose this type of malicious messages acts. In addition, the different ways to prevent and combat it. Usually, spam is a message with advertising content. What is Spam? The term `` Spam '' is an English word that refers to `` junk mail '' or `` junk Internet messaging , that is: unsolicited, unwanted and / or sender messages unknown , sent in large quantities and usually with advertising content

Cognitive

Cognitive

We explain what cognitive is and what cognitive psychology implies. In addition, its weak points, and differences with behaviorism. Cognitive psychology analyzes how knowledge is produced. What is cognitive? The word cognitive comes from the cognitive cognoscere, which means knowing . Thus, both cognitive psychology and cognitive processes refer to the ability to know through the senses and the reason that all individuals possess

Orbit

Orbit

We explain to you what an orbit is and what is its meaning in the area of ​​chemistry. What is an elliptical orbit and the solar system orbits. An orbit can have various shapes, either elliptical, circular or elongated. What is an orbit? In physics, orbit refers to the trajectory described by a body around another , around which it rotates by action of a central force, as is the gravitational force in the case of the stars light blue In less words, it is the trajectory that an object traces when moving around a center of gravity by which it is attracted, in principle without ever hitting it, bu