Firewall (computing): Difference between revisions

Content deleted Content added
Filled in 0 bare reference(s) with reFill 2
Reworded for clarity and tone; preserved citation and improved sentence structure.
Line 181:
Setting up a firewall is a complex and error-prone task. A network may face security issues due to configuration errors.<ref>{{Cite journal|last1=Voronkov|first1=Artem|last2=Iwaya|first2=Leonardo Horn|last3=Martucci|first3=Leonardo A.|last4=Lindskog|first4=Stefan|date=2018-01-12|title=Systematic Literature Review on Usability of Firewall Configuration|url=http://dx.doi.org/10.1145/3130876|journal=ACM Computing Surveys|volume=50|issue=6|pages=1–35|doi=10.1145/3130876|s2cid=6570517|issn=0360-0300|url-access=subscription}}</ref>
 
Firewall policypolicies configurationare istypically basedconfigured onaccording specificto networkthe type (e.g.of network in use, such as public or private), andenvironments. canAdministrators bedefine setrules upthat usingpermit firewallor rulesrestrict thattraffic eitherin blockorder orto allowreduce accessexposure to preventthreats potentiallike attacksunauthorized fromaccess, hackersmalware, or malwareother forms of cyberattack.<ref>{{Cite web|url=https://www.fortinet.com/resources/cyberglossary/firewall-configuration|title=What is Firewall Configuration and Why is it Important?|website=Fortinet}}</ref>
 
 
== See also ==