SlideShare a Scribd company logo
How Corporate Firewalls Work

    ●   About Firewall
    ●   About FTP
    ●   About Bastion Host
    ●   About Proxy Server
About Firewall
●   System to prevent from it being invaded a computer
    network in the organization with the firewall by the outside
●   In addition, the computer which such a system was
    incorporated in
●   Of the third person invades it through outside networks such
    as the Internet in the networks such as companies, and data
    or an underlook the destruction of the program being
    performed watch data drifting to the border with the outside
    so that there is not it, and it is necessary for the detection to
    intercept unjust access
●   A system realizing such a function is a firewall
About FTP
●   The FTP is abbreviation of File Transfer Protocol (a file
    transfer protocol) and becomes "the file-transfer protocol"
    when I translate it into Japanese
●   When it says intelligibly, it is long and sends a file into a
    machine in the remote place from a machine in one's very
    front, and it is structure far-off, to copy a file from a machine
    in the remote place in the reverse
●   When I thought that it would make one's homepage that a
    general Internet user employed being aware of FTP. When I
    employ a modem or TA (a terminal adaptor), and a general
    person connected to the Internet makes one's homepage
    with dial-up connection
About Bastion Host
●   A bastion host is a special purpose computer on a
    network specifically designed and configured to
    withstand attacks
●   The computer generally hosts a single application, for
    example a proxy server, and all other services are
    removed or limited to reduce the threat to the computer
●   It is hardened in this manner primarily due to its location
    and purpose, which is either on the outside of the
    firewall or in the DMZ and usually involves access from
    untrusted networks or computers
About Proxy Server
●   Proxy server is a server that acts as a go-between for
    requests from clients seeking resources from other
    servers
●   Proxy server evaluates the request according to its
    filtering rules
●   Proxy server may optionally alter the client's request or
    the server's response, and sometimes it may serve the
    request without contacting the specified server

More Related Content

Viewers also liked

1.important in viata
1.important in viata1.important in viata
1.important in viataNicky Nic
 
以积极的心态对待学习
以积极的心态对待学习以积极的心态对待学习
以积极的心态对待学习20004
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
vermigle
 
十七条成功法则
十七条成功法则十七条成功法则
十七条成功法则20004
 
Edw Portfolio 2
Edw Portfolio 2Edw Portfolio 2
Edw Portfolio 2
advenjunkie
 
ΠΟΛΥΤΕΧΝΕΙΟ
ΠΟΛΥΤΕΧΝΕΙΟΠΟΛΥΤΕΧΝΕΙΟ
ΠΟΛΥΤΕΧΝΕΙΟgymnasio
 
Urarea De Astazi
Urarea De AstaziUrarea De Astazi
Urarea De AstaziNicky Nic
 
UConn photos
UConn photosUConn photos
UConn photos
jdszwdcc
 
ευγενίδειο3 2013
ευγενίδειο3 2013ευγενίδειο3 2013
ευγενίδειο3 2013gymnasio
 
Connor big data
Connor big dataConnor big data
Connor big data
David Jimenez
 
Henry and mudge
Henry and mudgeHenry and mudge
Henry and mudge
vermigle
 
进阶策略销售培训
进阶策略销售培训进阶策略销售培训
进阶策略销售培训20004
 
2011-04-25 comments on Readability and Consistency for v5 Consultation
2011-04-25  comments on Readability and Consistency for v5 Consultation2011-04-25  comments on Readability and Consistency for v5 Consultation
2011-04-25 comments on Readability and Consistency for v5 Consultation
it-workforce.com
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
vermigle
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
vermigle
 
Cemil Ertem Taraf 040809
Cemil Ertem Taraf 040809Cemil Ertem Taraf 040809
Cemil Ertem Taraf 040809
Ozgur Uckan
 
积极心态培训
积极心态培训积极心态培训
积极心态培训20004
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学20004
 

Viewers also liked (20)

1.important in viata
1.important in viata1.important in viata
1.important in viata
 
以积极的心态对待学习
以积极的心态对待学习以积极的心态对待学习
以积极的心态对待学习
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
 
十七条成功法则
十七条成功法则十七条成功法则
十七条成功法则
 
Edw Portfolio 2
Edw Portfolio 2Edw Portfolio 2
Edw Portfolio 2
 
ΠΟΛΥΤΕΧΝΕΙΟ
ΠΟΛΥΤΕΧΝΕΙΟΠΟΛΥΤΕΧΝΕΙΟ
ΠΟΛΥΤΕΧΝΕΙΟ
 
Urarea De Astazi
Urarea De AstaziUrarea De Astazi
Urarea De Astazi
 
UConn photos
UConn photosUConn photos
UConn photos
 
ευγενίδειο3 2013
ευγενίδειο3 2013ευγενίδειο3 2013
ευγενίδειο3 2013
 
Connor big data
Connor big dataConnor big data
Connor big data
 
6
66
6
 
Henry and mudge
Henry and mudgeHenry and mudge
Henry and mudge
 
进阶策略销售培训
进阶策略销售培训进阶策略销售培训
进阶策略销售培训
 
2011-04-25 comments on Readability and Consistency for v5 Consultation
2011-04-25  comments on Readability and Consistency for v5 Consultation2011-04-25  comments on Readability and Consistency for v5 Consultation
2011-04-25 comments on Readability and Consistency for v5 Consultation
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
 
Cemil Ertem Taraf 040809
Cemil Ertem Taraf 040809Cemil Ertem Taraf 040809
Cemil Ertem Taraf 040809
 
积极心态培训
积极心态培训积极心态培训
积极心态培训
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学
 

Similar to Week14

Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest780f86
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
sandwep3
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Network security
Network securityNetwork security
Week14
Week14Week14
Week14
AaA247530
 
Week14 F
Week14 FWeek14 F
Week14 F
guruupuF
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
pg13tarun_g
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
karthikvcyber
 
How Corporate Firewalls Work
How Corporate Firewalls WorkHow Corporate Firewalls Work
How Corporate Firewalls Work
guestfc372f
 
Week14
Week14Week14
Week14
GroupB
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
Patten John
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
NetProtocol Xpert
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 

Similar to Week14 (20)

Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Group F Web Presentation Week13
Group F Web Presentation Week13Group F Web Presentation Week13
Group F Web Presentation Week13
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Network security
Network securityNetwork security
Network security
 
Week14
Week14Week14
Week14
 
Week14 F
Week14 FWeek14 F
Week14 F
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
How Corporate Firewalls Work
How Corporate Firewalls WorkHow Corporate Firewalls Work
How Corporate Firewalls Work
 
Week14
Week14Week14
Week14
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 

More from guest79a91d

Week14
Week14Week14
Week14
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Web Presen
Web PresenWeb Presen
Web Presen
guest79a91d
 
Week11
Week11Week11
Week11
guest79a91d
 
Week11
Week11Week11
Week11
guest79a91d
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
guest79a91d
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
guest79a91d
 

More from guest79a91d (14)

Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Week14

  • 1. How Corporate Firewalls Work ● About Firewall ● About FTP ● About Bastion Host ● About Proxy Server
  • 2. About Firewall ● System to prevent from it being invaded a computer network in the organization with the firewall by the outside ● In addition, the computer which such a system was incorporated in ● Of the third person invades it through outside networks such as the Internet in the networks such as companies, and data or an underlook the destruction of the program being performed watch data drifting to the border with the outside so that there is not it, and it is necessary for the detection to intercept unjust access ● A system realizing such a function is a firewall
  • 3. About FTP ● The FTP is abbreviation of File Transfer Protocol (a file transfer protocol) and becomes "the file-transfer protocol" when I translate it into Japanese ● When it says intelligibly, it is long and sends a file into a machine in the remote place from a machine in one's very front, and it is structure far-off, to copy a file from a machine in the remote place in the reverse ● When I thought that it would make one's homepage that a general Internet user employed being aware of FTP. When I employ a modem or TA (a terminal adaptor), and a general person connected to the Internet makes one's homepage with dial-up connection
  • 4. About Bastion Host ● A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks ● The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer ● It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers
  • 5. About Proxy Server ● Proxy server is a server that acts as a go-between for requests from clients seeking resources from other servers ● Proxy server evaluates the request according to its filtering rules ● Proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server