Thursday, October 14, 2010

Waterproof Wall - terminology to explain

In the field of computer security, firewall and waterproof walls are a very similar name. Firewall is installed in different networks (such as a trusted internal network and the untrusted public network) or network security domain combinations between the number of components. It can monitor, limit, change the data flow across the firewall, as far as possible within the network on the external screen of information, structure and operating conditions, in order to achieve network security. Logically, a firewall is a separator, a limiter, is a parser to effectively monitor the internal network and the Internet between any activities to ensure that the internal network security.

As a result, we know that a firewall to prevent external network through the isolation of the internal network to attack, it passively inspect all network packets flow through to block the communication security policy violations. Firewalls are based on the work of a basic assumption: it is located inside and outside the network access point, and there is no other bypass external gateway is based on this assumption, the firewall within the network became the protector. But, obviously, for internal security, the firewall can do nothing.

Waterproof wall thus came into being, and the traditional firewall concept is completely different, waterproof wall design to prevent leakage of internal information like water. The birth of a firewall is to prevent outside intrusion. It is a monitoring system within the network, at the internal network, at any time monitor the security situation within the host. If the fire is to prevent the spread of external threats to internal, then water is the means to prevent the leakage of internal information. Visible, waterproof wall is a network monitoring system within this very image of a call.

Simple waterproof wall by the probe and the monitoring center. In general, which consists of three structures: high-level user interface layer, real-time updates based within the network topology to provide system configuration, policy configuration, real-time monitoring, audit reports, security alarm and other functions; low-level modules layer, the distribution of the probe in the composition of each host; middle layer of the security services, real-time information collected from the lower to the senior report or alarm, and record the whole system of audit information, to prepare for queries or generate reports.

Waterproof wall generally has the following major functions: information leakage prevention, to prevent the internal network host, network, storage media, printers and other media, intentionally or unintentionally Kuosan local confidential information; system user management system records the user login information for the provide the basis for future safety audits; system resources, security management, limited hardware and software installation, uninstall, control the operation of a specific procedure to restrict the system into Safe Mode, rename the control file and delete operations; real-time health monitoring system, through the Intranet real-time capture and record screen host, to monitor internal security personnel to deter malicious insiders, and after the issue of security and provide the basis of its source, when necessary, can also be involved in direct control security of the host I / O devices such as keyboard, mouse, etc.; information security audit, network security audit record information, and provide the host within the network usage, security event analysis report.

In summary, the water wall is a firewall, virtual private networks, intrusion detection systems and other safety equipment, security services provided by an effective complement. On the overall security system, it is also an integral part. Although information security products, including encryption, antivirus, firewall, anti-electromagnetic radiation, platform systems, electronic authentication, vulnerability scanning, intrusion detection, identification authentication, physical security protection system and other ten series, but these products can only be part of the solution , not the whole problem.

According to international authorities CSI / FBI statistical data provided, and aggressive behavior in many cases, the most important time is the most secure information leakage; attacks were mainly from within, not from outside hackers. Well, there is no readily available information technology or products can block the leakage of the tap it? Waterproof wall system, such a system is adopted.

Waterproof wall system is composed of Internet access security control, computer control port security, procedures, use of safety control, safety control file copy, CD burner safety control, file and print security control, illegal invasion of security control, security control hardware resources, operating behavior management, remote surveillance, immunization and virus hackers trojan from a centralized management platform.

Recommended links:

ASP script Timeout problem when running the ultimate solution

SIMULATION using Flash MX stage 5 Lantern

MP4 to WMP

Custom FTP Enjoy The Thrill Of Speed Of Downloads

Sichuan Instrument flow meters: precision production of personalized QUOTE

Bai-Hua Wang nice view here

theoretical knowledge MANAGEMENT and enterprise

Netac flash news Huaqi patent dispute SETTLEMENT reached in equal

Wizard Encryption Tools

Recommend Audio CD Burners


3 years 68 million PHS users delisting where flow (Figure)



  1. Lifesaver Bottle 4000 Ultra Filtration Drinking water Bottle - this fantastic machines can take out germs,
    pathogens, viruses, and most destructive solutions from drinking water by way of using filters.

    My site :: just click the following page

  2. The point is usually that while you turn into additional healthy,
    you'll be able to workout longer.

    My blog post :: weights and dumbbells for sale

  3. You may also carry your stairmaster along with you when you have to consider a
    company or satisfaction excursion.

    Also visit my web page: visit the following post

  4. Every person band contains a specified quantity of resistance that it provides.

    Look at my homepage; Read the Full Post