SlideShare a Scribd company logo
1 of 14
Application of networks and
communication
• The various practical application of network
and communications are
1. Workgroup computing and Groupware
2. Telecommuting and virtual offices
Work group computing and groupware
• Telecommunication networks and computers
enable us to collaborate; to share resources,
communicate ideas and schedule meetings.
• A group of people working together on a
particular task or assignment and sharing
information is called “work group”.
• In work group computing, also called
collaborative computing, teams of co-workers,
often at different locations, uses network or
micro computers to share information and to co-
operate on projects.
• Work group computing is made possible by a
software called groupware, which allows
two or more people on a network to work
on the same project at the same time.
• What is a Groupware?
• It allows several people to use software at
the same time to create documents, keep
track of projects, route messages and
managing deadlines.
Eg: Lotus Notes
• Lotus notes, now called IBM notes provides many
features such as
• Send and receive emails, Maintain contacts with
group and calendar with events , group
scheduling etc.
Telecommuting and virtual offices
• Telecommuting is working at home or on travel
using telecommunication networks
• Telecommuting , e-commuting, e-work, working
from home(WFH) or working at home (WAH) is
a work arrangement in which employees
enjoy flexibility in working location and hours
• Tools used by telecommuting are groupware,
conferencing calling, video conferencing and
voice over IP.
• It can be efficient and useful for companies as
it allows staff and workers to communicate
over a large distance, saving significant
amounts of travel time and cost.
• The virtual office is a non permanent and
mobile office run with computers and
communications technology
• Employees work from their homes, cars and
other new work sites
• They use portable computers and various
network and communication services to do
the business.
• Such an office exists more in virtual space
than in physical space.
Network security
• Network security is the security provided to
protect the network and the network accessible
resources (computers , printers etc) from
unauthorized access, risks and continuous
monitoring and measurements.
• Only legal and authorized users are given access
to network.
• It is the duty of network administrator to adopt
preventive measures to protect their networks
from potential security threats.
• The most common and simple way of
protecting network is by assigning it a
username and a corresponding password.
• Network security methods
1. Establishing strong passwords for
authentication
2. Put up strong firewall which is a software or
hardware or both protecting against
unauthorized access
3. Install antivirus software in all work stations
• Implement a proper security policy in the
network
• Install a filtering software to filter both
incoming and outgoing messages and to
ensure protection from malware.
• Block all the unwanted websites and web
application which have security risks.
• Use biometric system to prove the identity of
a person.
Firewall
• A firewall can be defined as a hardware
and/or software placed between an
organization’s internal network and external
network.
• A firewall is a network security system that
enforces security policy between a trusted
organization’s network and the internet.
• Malware, malicious software, is the primary
threat to your company network. Viruses are
often the first type of malware that comes to
mind. A virus can be transmitted to your
company network through email or over the
Internet and can quickly cause a lot of damage
to your files.
There are two types of firewalls
1. Inside firewall
2. Outside firewall
Inside firewall
• Network and machines of the intranet of the
company are protected by the internal
firewall.
Outside firewall
• Protect the access between the company
networks with that of all the other networks
(extranet)
• All traffic from the outside must pass through
it.
• Through firewalls only authorized traffic is
allowed to pass
• They are two types of firewall available in the
market. They are software based and
software and hardware based.
• Both are protect your network and device
from security threats
The major function of a firewall are
• A firewall carefully examine each network
packet before forwarding it to the destination
• Incoming request are verified with domain
name and IP address
• Protection from vulnerable services
• Set automatic alarm if suspicious activity is
noticed.
Components of a firewall

More Related Content

Similar to bcomclasscond.pptx

Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITDeepraj Bhujel
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxrocky781582
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemssree kanth
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerSHARMA EDUCATION
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleSACHIN SHARMA
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 

Similar to bcomclasscond.pptx (20)

Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security
Computer securityComputer security
Computer security
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - IT
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin consoleAntirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
Antirus,Firewall,Encryption,Wifi Routers, IAS, Google admin console
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Ic3 presentation1 online
Ic3 presentation1 onlineIc3 presentation1 online
Ic3 presentation1 online
 

Recently uploaded

Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...ThinkInnovation
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证ju0dztxtn
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Valters Lauzums
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationmuqadasqasim10
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksBoston Institute of Analytics
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证pwgnohujw
 
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster AnalysisData Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster AnalysisBoston Institute of Analytics
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"John Sobanski
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjadimosmejiaslendon
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesBoston Institute of Analytics
 
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethDigital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethSamantha Rae Coolbeth
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...BabaJohn3
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchersdarmandersingh4580
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeBoston Institute of Analytics
 
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证a8om7o51
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives23050636
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...yulianti213969
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Klinik Aborsi
 

Recently uploaded (20)

Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster AnalysisData Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethDigital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
 
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 

bcomclasscond.pptx

  • 1. Application of networks and communication • The various practical application of network and communications are 1. Workgroup computing and Groupware 2. Telecommuting and virtual offices
  • 2. Work group computing and groupware • Telecommunication networks and computers enable us to collaborate; to share resources, communicate ideas and schedule meetings. • A group of people working together on a particular task or assignment and sharing information is called “work group”. • In work group computing, also called collaborative computing, teams of co-workers, often at different locations, uses network or micro computers to share information and to co- operate on projects.
  • 3. • Work group computing is made possible by a software called groupware, which allows two or more people on a network to work on the same project at the same time. • What is a Groupware? • It allows several people to use software at the same time to create documents, keep track of projects, route messages and managing deadlines.
  • 4. Eg: Lotus Notes • Lotus notes, now called IBM notes provides many features such as • Send and receive emails, Maintain contacts with group and calendar with events , group scheduling etc. Telecommuting and virtual offices • Telecommuting is working at home or on travel using telecommunication networks • Telecommuting , e-commuting, e-work, working from home(WFH) or working at home (WAH) is
  • 5. a work arrangement in which employees enjoy flexibility in working location and hours • Tools used by telecommuting are groupware, conferencing calling, video conferencing and voice over IP. • It can be efficient and useful for companies as it allows staff and workers to communicate over a large distance, saving significant amounts of travel time and cost.
  • 6. • The virtual office is a non permanent and mobile office run with computers and communications technology • Employees work from their homes, cars and other new work sites • They use portable computers and various network and communication services to do the business. • Such an office exists more in virtual space than in physical space.
  • 7. Network security • Network security is the security provided to protect the network and the network accessible resources (computers , printers etc) from unauthorized access, risks and continuous monitoring and measurements. • Only legal and authorized users are given access to network. • It is the duty of network administrator to adopt preventive measures to protect their networks from potential security threats.
  • 8. • The most common and simple way of protecting network is by assigning it a username and a corresponding password. • Network security methods 1. Establishing strong passwords for authentication 2. Put up strong firewall which is a software or hardware or both protecting against unauthorized access 3. Install antivirus software in all work stations
  • 9. • Implement a proper security policy in the network • Install a filtering software to filter both incoming and outgoing messages and to ensure protection from malware. • Block all the unwanted websites and web application which have security risks. • Use biometric system to prove the identity of a person.
  • 10. Firewall • A firewall can be defined as a hardware and/or software placed between an organization’s internal network and external network. • A firewall is a network security system that enforces security policy between a trusted organization’s network and the internet.
  • 11. • Malware, malicious software, is the primary threat to your company network. Viruses are often the first type of malware that comes to mind. A virus can be transmitted to your company network through email or over the Internet and can quickly cause a lot of damage to your files.
  • 12. There are two types of firewalls 1. Inside firewall 2. Outside firewall Inside firewall • Network and machines of the intranet of the company are protected by the internal firewall. Outside firewall • Protect the access between the company networks with that of all the other networks (extranet)
  • 13. • All traffic from the outside must pass through it. • Through firewalls only authorized traffic is allowed to pass • They are two types of firewall available in the market. They are software based and software and hardware based. • Both are protect your network and device from security threats
  • 14. The major function of a firewall are • A firewall carefully examine each network packet before forwarding it to the destination • Incoming request are verified with domain name and IP address • Protection from vulnerable services • Set automatic alarm if suspicious activity is noticed. Components of a firewall