Authors :
Parth Kasurde; Haftaandad Nikorawalla; Rudraksh Tandon
Volume/Issue :
Volume 8 - 2023, Issue 1 - January
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3kuZcWQ
DOI :
https://doi.org/10.5281/zenodo.7556200
Abstract :
The volume of internet transactions has
multiplied dramatically in recent years. The internet,
however, has numerous security flaws. As a result,
protecting our sensitive data is currently a very difficult
task. The majority of medium and big businesses having
an online presence are linked to a network. Security
demands that a barrier be built between the internal
network and the public Internet. The "trusted" and
"untrusted" sides of the network can be used to describe
them.
There are numerous tools and gadgets available to
assist safeguard our data. By enrolling in the top cyber
security certification programmes, anyone can learn more
about these concepts. For instance, a firewall safeguards
our data and deters illegal access.
Keywords :
Firewall Technology, Computer Network Security
The volume of internet transactions has
multiplied dramatically in recent years. The internet,
however, has numerous security flaws. As a result,
protecting our sensitive data is currently a very difficult
task. The majority of medium and big businesses having
an online presence are linked to a network. Security
demands that a barrier be built between the internal
network and the public Internet. The "trusted" and
"untrusted" sides of the network can be used to describe
them.
There are numerous tools and gadgets available to
assist safeguard our data. By enrolling in the top cyber
security certification programmes, anyone can learn more
about these concepts. For instance, a firewall safeguards
our data and deters illegal access.
Keywords :
Firewall Technology, Computer Network Security