Firewall concepts and access control lists

Source: Internet
Author: User
Tags firewall

Personal understanding Firewall is divided into software firewall and hardware firewall.

In the case of software firewalls, there are also network firewalls and virus firewalls, among which there are mobile firewalls. We often use the software firewall brand including rising, Ice shield and so on.

On the hardware firewall I am here to quote something ready-made to illustrate the use of hardware firewalls in the network.

First of all, why should we study security?

What is "computer security"? Broadly speaking, security is about preventing others from using your computer or peripherals to do anything you don't want them to do. The first question is: "What resources are we trying to protect?" "The answer is not clear. Usually, the answer to this question is to take the necessary mainframe-specific measures. Figure 5 depicts the current network is strong.

Many people complain that Windows is too vulnerable, and some people even bother with one or another of these vulnerabilities. To this end, this article briefly introduces you how to put up the network security line of defense.

Disabling unused services

Windows offers a lot of services, but there are many that we simply can't use. You may not know yet that some services are opening the back door for those who have ulterior motives.

Windows has a number of services that are not covered here too much. We can prohibit certain services according to our actual situation. Disabling unnecessary services, in addition to reducing security risks, can also increase the speed of Windows, why not?

To play Patches

Microsoft will occasionally offer patches online free of charge and have time to play patches. In addition to enhancing compatibility, it is more important to plug the detected security vulnerabilities. Suggest the ability of a friend can according to their actual situation according to the circumstances dozen fit their own patches.

Firewall

Choose a completely isolate virus method, physical isolation fortigate can prevent more than 10 kinds of hacker attacks,

Distributed service denial of attack DDoS (distributed Denial-of-service attacks)

※syn Attack

※ICMP Flood

※UDP Flood

IP fragmentation attacks (IP fragmentation attacks)

※ping of Death attack

※tear Drop attack

※land attack

Port scan Attack (Scan attacks)



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.