{"id":1589,"date":"2022-08-31T09:37:10","date_gmt":"2022-08-31T02:37:10","guid":{"rendered":"https:\/\/dec.vn\/giai-phap-bao-mat-tuong-lua\/"},"modified":"2024-01-30T11:20:19","modified_gmt":"2024-01-30T04:20:19","slug":"security-solution-firewall","status":"publish","type":"page","link":"https:\/\/dec.vn\/en\/security-solution-firewall\/","title":{"rendered":"Security solution, firewall"},"content":{"rendered":"<p><strong>1. What is information security?<\/strong><\/p>\n<p>Information security is the activity of maintaining the confidentiality, integrity, and availability of all information. These three elements always can not be separated.<\/p>\n<ul>\n<li><strong>Confindentiality:<\/strong> Ensuring all important information is not leaked or stolen. The information is only allowed to be accessed by authorized persons.<\/li>\n<li><strong>Integrity:<\/strong> Ensuring that information is not changed or is only allowed to be edited by authorized persons. In addition, integrity ensures that information remains accurate when it is stored or transmitted.<\/li>\n<li><strong>Availability:<\/strong> Ensuring that information can be accessed by authorized persons whenever they want.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"size-full wp-image-1493 aligncenter\" title=\"Firewall 500 2 2\" src=\"http:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/Firewall-500-2-2-1-1-1-1.png\" alt=\"Firewall 500\" width=\"1131\" height=\"500\" srcset=\"https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/Firewall-500-2-2-1-1-1-1.png 1131w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/Firewall-500-2-2-1-1-1-1-300x133.png 300w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/Firewall-500-2-2-1-1-1-1-1024x453.png 1024w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/Firewall-500-2-2-1-1-1-1-768x340.png 768w\" sizes=\"(max-width: 1131px) 100vw, 1131px\" \/><\/p>\n<p><strong>2. Why implement information security solutions?<\/strong><\/p>\n<ul>\n<li>Leaking confidential information<\/li>\n<li>Leaking personal information<\/li>\n<li>Paralyzing the system<\/li>\n<li>Infected with virus<\/li>\n<\/ul>\n<p>Therefore, when using an unsafe computer, without the information security system, it will cause harm to users, causing disputes, lawsuits and damages to individuals, organizations, companies, etc.<\/p>\n<p><strong>3. What is a firewall?<\/strong><img loading=\"lazy\" class=\"size-full wp-image-1494 aligncenter\" title=\"rm373batch3 banner 07\" src=\"http:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/rm373batch3-banner-07-1024x683-1-1-1-1.jpg\" alt=\"rm373batch3 banner 07\" width=\"1024\" height=\"683\" srcset=\"https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/rm373batch3-banner-07-1024x683-1-1-1-1.jpg 1024w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/rm373batch3-banner-07-1024x683-1-1-1-1-300x200.jpg 300w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/rm373batch3-banner-07-1024x683-1-1-1-1-768x512.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>In computing, a firewall is a network security system that monitors and controls in-&amp;-out network traffic based on predefined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet.<\/p>\n<p><strong>4. Why do we need to use firewall?<\/strong><\/p>\n<p>Firewall plays a very important role to prevent dangerous components such as hackers, worms, or viruses before they can enter our computer.<\/p>\n<p>Firewall brings many beneficial effects to the computer system. Specifically:<\/p>\n<ul>\n<li>Preventing unauthorized access to private networks. It acts as a doorman, checking all data entering or leaving the private network. When it detects any unauthorized access, it will prevent that traffic from reaching the private network.<\/li>\n<li>Blocking network attacks.<\/li>\n<li>Running as security checkpoints by filtering information connected via the internet to a network or personal computer.<\/li>\n<li>Easily controlling connections to the website or restricting some connections from unwanted users.<\/li>\n<li>Users can customize the firewall according to their needs by setting appropriate security policies.<\/li>\n<\/ul>\n<p><strong>5. Different types of firewalls<\/strong><\/p>\n<p>Firewals are devided into two main types: software firewall and hardware firewall:<\/p>\n<ul>\n<li><strong>Hardware Firewall:<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"size-full wp-image-1495 aligncenter\" title=\"security g34d51cff0 1920\" src=\"http:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g34d51cff0_1920-1024x649-1-1-1-1.jpg\" alt=\"security g34d51cff0 1920\" width=\"1024\" height=\"649\" srcset=\"https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g34d51cff0_1920-1024x649-1-1-1-1.jpg 1024w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g34d51cff0_1920-1024x649-1-1-1-1-300x190.jpg 300w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g34d51cff0_1920-1024x649-1-1-1-1-768x487.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"padding-left: 40px;\">Being a security device that represents a separate part of hardware placed between an internal and external network (the Internet). This type is also known as Device Firewall.<\/p>\n<p style=\"padding-left: 40px;\">Unlike software firewall, hardware firewall has its own resources and does not consume any CPU or RAM from host devices. This is a physical device that acts as a gatekeeper allowing or disallowing traffic in-and-out from the internal network to the outside and vice versa.<\/p>\n<p style=\"padding-left: 40px;\">Configuring and managing hardware firewalls requires knowledge and skills in device configuration, administration, and management to strictly control traffic data and prevent harmful external agents.<\/p>\n<ul>\n<li><strong>Software Firewall:<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"size-full wp-image-1496 aligncenter\" title=\"security g794d96220 1920\" src=\"http:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g794d96220_1920-1024x683-1-1-1-1.jpg\" alt=\"security g794d96220 1920\" width=\"1024\" height=\"683\" srcset=\"https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g794d96220_1920-1024x683-1-1-1-1.jpg 1024w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g794d96220_1920-1024x683-1-1-1-1-300x200.jpg 300w, https:\/\/dec.vn\/wp-content\/uploads\/2022\/10\/security-g794d96220_1920-1024x683-1-1-1-1-768x512.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"padding-left: 40px;\">A software firewall is installed on the host device (server, personal computer, &#8230;). Therefore, this type of firewall is also known as Host Firewall. Because it is attached to a specific device, it must use the resources of this own device to run. Software firewall needs to be installed on each individual device, depending on the number of devices that require security.<\/p>\n<p style=\"padding-left: 40px;\">Because the software firewall is managed on each device, it is flexible and easy to configure. Users can easily set up the level of protection as they want, providing different levels of security depending on the machine or user.<\/p>\n<p style=\"padding-left: 40px;\">Protection Anytime, Anywhere: A software firewall protecting a computer is installed anywhere the computer is connected.<\/p>\n<p style=\"padding-left: 40px;\">Having low deployment costs compared to hardware firewalls<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. What is information security? Information security is the activity of maintaining the confidentiality, integrity, and availability of all information. These three elements always can not be separated. Confindentiality: Ensuring all important information is not leaked or stolen. The information is only allowed to be accessed by authorized persons. Integrity: Ensuring that information is not &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/dec.vn\/en\/security-solution-firewall\/\"> <span class=\"screen-reader-text\">Security solution, firewall<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":1406,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":""},"acf":[],"_links":{"self":[{"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/pages\/1589"}],"collection":[{"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/comments?post=1589"}],"version-history":[{"count":5,"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/pages\/1589\/revisions"}],"predecessor-version":[{"id":2284,"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/pages\/1589\/revisions\/2284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/media\/1406"}],"wp:attachment":[{"href":"https:\/\/dec.vn\/en\/wp-json\/wp\/v2\/media?parent=1589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}