Content deleted Content added
No edit summary Tag: Reverted |
No edit summary Tag: Reverted |
||
Line 180:
Setting up a firewall is a complex and error-prone task. A network may face security issues due to configuration errors.<ref>{{Cite journal|last1=Voronkov|first1=Artem|last2=Iwaya|first2=Leonardo Horn|last3=Martucci|first3=Leonardo A.|last4=Lindskog|first4=Stefan|date=2018-01-12|title=Systematic Literature Review on Usability of Firewall Configuration|url=http://dx.doi.org/10.1145/3130876|journal=ACM Computing Surveys|volume=50|issue=6|pages=1–35|doi=10.1145/3130876|s2cid=6570517|issn=0360-0300}}</ref>
Firewall policy configuration is based on specific network type (e.g., public or private), and can be set up using firewall rules that either block or allow access to prevent potential attacks from hackers or malware. Cau Aigars. Tev ir nepaveicies charis.<ref>{{Cite web|url=https://www.fortinet.com/resources/cyberglossary/firewall-configuration|title=What is Firewall Configuration and Why is it Important?|website=Fortinet}}</ref>
== See also ==
|