Abstract of Firewall: A Security, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 142 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Information Technology | India | Volume 4 Issue 12, December 2015


Firewall: A Security Point of a Network

Manoj Parmar


Abstract: A firewall is a software program or hardware with software program that creates a security perimeter whose main function is control unauthorized access of incoming and outgoing data or information over a network. Firewalls protect you from offensive software that may come to reside on your systems or from prying hackers. When connected to the internet, even a standalone PC or a network of interconnected computers make easy targets for malicious software & unscrupulous hackers. A firewall can offer the security that makes you less vulnerable and also protect your data from being compromised or your computers being taken hostage. A firewall protects the flow of traffic over internet and is less restrictive of outward and inward information and also provides internal user the illusion of anonymous FTP and www connectivity to internet.


Keywords: Firewall, attacks, gateways, packet filter, intruder, application gateways


Edition: Volume 4 Issue 12, December 2015,


Pages: 1568 - 1570


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Manoj Parmar, "Firewall: A Security Point of a Network", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 1568-1570, https://www.ijsr.net/get_abstract.php?paper_id=NOV152325

Similar Articles with Keyword 'Firewall'

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, United States of America, Volume 13 Issue 7, July 2024

Pages: 1586 - 1598

Beyond the Firewall: Securely Exposing Cloud Native API

Ramakrishna Manchana [11]

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda [4]

Share this Article
Top