SlideShare a Scribd company logo
How Corporate Firewall Work ,[object Object],[object Object],[object Object],[object Object]
Bastion Host On the Internet, a bastion host is the only host computer that a company allows to be addressed directly from the ublic network and that is designed to screen the rest of its network from security exposure.
Firewall? ,[object Object]
Proxy server ,[object Object]
Search Engine A web search engine is a tool designed to search for information on the world wide web . The search results are usually presented in a list and are commonly called hits .The ingormation may consist of web pages , images also mine data available in databases or open directories .Unlike Web directories , which are maintained by human editors , search engines operate algorithmically or are a mixture of algorithmic and human input .
Reference ,[object Object],[object Object],[object Object],[object Object]

More Related Content

Similar to week14

Proxy Server
Proxy ServerProxy Server
Proxy Server
Netwax Lab
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
Proxies Rent
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
Proxies Rent
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
stableproxies
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
Proxies Rent
 
Pre Week13
Pre Week13Pre Week13
Pre Week13
Ryosuke
 
Pre Week14
Pre Week14Pre Week14
Pre Week14
Ryosuke
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
HTS Hosting
 
Proxy server
Proxy serverProxy server
Proxy server
Proxies Rent
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
AjaySahre
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trends
Proxies Rent
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Dos1
Dos1Dos1
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
tim4911
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
Wail Hassan
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
JayaMishra170943
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
Alwin Thayyil
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
nullowaspmumbai
 

Similar to week14 (20)

Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Pre Week13
Pre Week13Pre Week13
Pre Week13
 
Pre Week14
Pre Week14Pre Week14
Pre Week14
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Proxy server
Proxy serverProxy server
Proxy server
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trends
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Dos1
Dos1Dos1
Dos1
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 

week14

  • 1.
  • 2. Bastion Host On the Internet, a bastion host is the only host computer that a company allows to be addressed directly from the ublic network and that is designed to screen the rest of its network from security exposure.
  • 3.
  • 4.
  • 5. Search Engine A web search engine is a tool designed to search for information on the world wide web . The search results are usually presented in a list and are commonly called hits .The ingormation may consist of web pages , images also mine data available in databases or open directories .Unlike Web directories , which are maintained by human editors , search engines operate algorithmically or are a mixture of algorithmic and human input .
  • 6.