Rbreb13 Posted January 7, 2003 Report Share Posted January 7, 2003 Firewalls are the most effective defense against cyberintruders on the network, and they are becoming increasingly better at blocking network-based attacks. Stages in firewall evolution include: Access control lists Routers and gateways make decisions based on source and destination IP addresses, as well as the protocol that a connection is attempting to use. Each protocol is associated with a different port number—for example, port 80 for HTTP or port 110 for Post Office Protocol. Many gateways simply block all access, with exceptions for standard protocols such as HTTP for Web access and Simple Mail Transfer Protocol for e-mail. However, attack applications can be tunneled over port 80 to circumvent the firewall. More Here Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.