strategy

Using computer firewall protection

Description:
A strategy called ''firewalls'' has been developed, whereby a second computer (a firewall) is placed between an organization's own computer and the Internet communication lines, to help control access and prevent "break-ins." It has been found that even a triple firewall architecture has been successfully penetrated by hackers.
Subjects:
Societal Problems Protection
Informatics, Classification Informatics
Type Classification:
F: Exceptional strategies