Using computer firewall protection
Description
A strategy called ''firewalls'' has been developed, whereby a second computer (a firewall) is placed between an organization's own computer and the Internet communication lines, to help control access and prevent "break-ins." It has been found that even a triple firewall architecture has been successfully penetrated by hackers.
Broader
Metadata
Database
Global strategies
Type
(F) Exceptional strategies
Subject
Societal problems » Protection
Informatics, classification » Informatics
Content quality
Yet to rate
Language
English
Last update
Dec 3, 2024