SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
How Corporate Firewalls Work

    ●   About Firewall
    ●   About FTP
    ●   About Bastion Host
    ●   About Proxy Server
About Firewall
●   System to prevent from it being invaded a computer
    network in the organization with the firewall by the outside
●   In addition, the computer which such a system was
    incorporated in
●   Of the third person invades it through outside networks such
    as the Internet in the networks such as companies, and data
    or an underlook the destruction of the program being
    performed watch data drifting to the border with the outside
    so that there is not it, and it is necessary for the detection to
    intercept unjust access
●   A system realizing such a function is a firewall
About FTP
●   The FTP is abbreviation of File Transfer Protocol (a file
    transfer protocol) and becomes "the file-transfer protocol"
    when I translate it into Japanese
●   When it says intelligibly, it is long and sends a file into a
    machine in the remote place from a machine in one's very
    front, and it is structure far-off, to copy a file from a machine
    in the remote place in the reverse
●   When I thought that it would make one's homepage that a
    general Internet user employed being aware of FTP. When I
    employ a modem or TA (a terminal adaptor), and a general
    person connected to the Internet makes one's homepage
    with dial-up connection
About Bastion Host
●   A bastion host is a special purpose computer on a
    network specifically designed and configured to
    withstand attacks
●   The computer generally hosts a single application, for
    example a proxy server, and all other services are
    removed or limited to reduce the threat to the computer
●   It is hardened in this manner primarily due to its location
    and purpose, which is either on the outside of the
    firewall or in the DMZ and usually involves access from
    untrusted networks or computers
About Proxy Server
●   Proxy server is a server that acts as a go-between for
    requests from clients seeking resources from other
    servers
●   Proxy server evaluates the request according to its
    filtering rules
●   Proxy server may optionally alter the client's request or
    the server's response, and sometimes it may serve the
    request without contacting the specified server

Más contenido relacionado

Destacado

为什么培训
为什么培训为什么培训
为什么培训
20004
 
企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)
20004
 
岗 前 培 训
岗  前  培  训岗  前  培  训
岗 前 培 训
20004
 
1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)
20004
 
教练型领导
教练型领导教练型领导
教练型领导
20004
 
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom PresentationC:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
vermigle
 
Extravagant 50th Birthday
Extravagant 50th BirthdayExtravagant 50th Birthday
Extravagant 50th Birthday
RobbyBarbaro
 
Txt messaging will never catch on !
Txt messaging will never catch on !Txt messaging will never catch on !
Txt messaging will never catch on !
Andy Black
 
Dory squirreis
Dory squirreisDory squirreis
Dory squirreis
vermigle
 
Presentation - K&Co.
Presentation - K&Co.Presentation - K&Co.
Presentation - K&Co.
karelco
 
Arctic fox cynthia
Arctic fox cynthiaArctic fox cynthia
Arctic fox cynthia
vermigle
 
1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice
vermigle
 
Shannon Sports
Shannon SportsShannon Sports
Shannon Sports
missmarsh
 

Destacado (20)

Valtti-koulutus 20.1.2009
Valtti-koulutus 20.1.2009Valtti-koulutus 20.1.2009
Valtti-koulutus 20.1.2009
 
为什么培训
为什么培训为什么培训
为什么培训
 
企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)企业文化建设与企业核心竞争立(讲义)
企业文化建设与企业核心竞争立(讲义)
 
岗 前 培 训
岗  前  培  训岗  前  培  训
岗 前 培 训
 
B
BB
B
 
1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)1 教练技术第一阶段讲义(版本一)
1 教练技术第一阶段讲义(版本一)
 
教练型领导
教练型领导教练型领导
教练型领导
 
5
55
5
 
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom PresentationC:\Users\Vermiglio\Documents\Flat Classroom Presentation
C:\Users\Vermiglio\Documents\Flat Classroom Presentation
 
28 oct2012
28 oct201228 oct2012
28 oct2012
 
Extravagant 50th Birthday
Extravagant 50th BirthdayExtravagant 50th Birthday
Extravagant 50th Birthday
 
Txt messaging will never catch on !
Txt messaging will never catch on !Txt messaging will never catch on !
Txt messaging will never catch on !
 
Dory squirreis
Dory squirreisDory squirreis
Dory squirreis
 
Presentation - K&Co.
Presentation - K&Co.Presentation - K&Co.
Presentation - K&Co.
 
Mobile learning isn’t one flavour or one approach it’s a whole grocery store
Mobile learning isn’t one flavour or one approach it’s a whole grocery storeMobile learning isn’t one flavour or one approach it’s a whole grocery store
Mobile learning isn’t one flavour or one approach it’s a whole grocery store
 
Arctic fox cynthia
Arctic fox cynthiaArctic fox cynthia
Arctic fox cynthia
 
1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice1st and 2nd quarter high freq. slideshow voice
1st and 2nd quarter high freq. slideshow voice
 
28 okt 2013
28 okt 201328 okt 2013
28 okt 2013
 
Mike Bernos Cd Release Event Older Version Comp
Mike Bernos Cd Release Event Older Version CompMike Bernos Cd Release Event Older Version Comp
Mike Bernos Cd Release Event Older Version Comp
 
Shannon Sports
Shannon SportsShannon Sports
Shannon Sports
 

Similar a Week14

Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
sandwep3
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
pg13tarun_g
 
How Corporate Firewalls Work
How Corporate Firewalls WorkHow Corporate Firewalls Work
How Corporate Firewalls Work
guestfc372f
 

Similar a Week14 (20)

Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Network security
Network securityNetwork security
Network security
 
Week14
Week14Week14
Week14
 
Week14 F
Week14 FWeek14 F
Week14 F
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
How Corporate Firewalls Work
How Corporate Firewalls WorkHow Corporate Firewalls Work
How Corporate Firewalls Work
 
Week14
Week14Week14
Week14
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 

Más de guest79a91d (15)

Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Week14

  • 1. How Corporate Firewalls Work ● About Firewall ● About FTP ● About Bastion Host ● About Proxy Server
  • 2. About Firewall ● System to prevent from it being invaded a computer network in the organization with the firewall by the outside ● In addition, the computer which such a system was incorporated in ● Of the third person invades it through outside networks such as the Internet in the networks such as companies, and data or an underlook the destruction of the program being performed watch data drifting to the border with the outside so that there is not it, and it is necessary for the detection to intercept unjust access ● A system realizing such a function is a firewall
  • 3. About FTP ● The FTP is abbreviation of File Transfer Protocol (a file transfer protocol) and becomes "the file-transfer protocol" when I translate it into Japanese ● When it says intelligibly, it is long and sends a file into a machine in the remote place from a machine in one's very front, and it is structure far-off, to copy a file from a machine in the remote place in the reverse ● When I thought that it would make one's homepage that a general Internet user employed being aware of FTP. When I employ a modem or TA (a terminal adaptor), and a general person connected to the Internet makes one's homepage with dial-up connection
  • 4. About Bastion Host ● A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks ● The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer ● It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers
  • 5. About Proxy Server ● Proxy server is a server that acts as a go-between for requests from clients seeking resources from other servers ● Proxy server evaluates the request according to its filtering rules ● Proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server