Date & Clock

Wednesday, August 10, 2011

♦Partial Requirement Under IT6♦


Firewall

A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

source:http://www.webopedia.com

♦Partial Requirement Under IT6♦

                                 
                                    Photo credit: http://www.directindustry.com
                            
Access Control

              Access control systems are physical or electronic systems which are designed to control who has access to a network. The simplest example of a physical access control system is a door which can be locked, limiting people to one side of the door or the other. Electronic access control systems typically control network security, limiting which users are allowed to use resources on a computer system, for example. Several security companies specialize in providing access control systems and supporting hardware and software for companies of all sizes.
              In some cases, physical access control systems are integrated with electronic ones. For example, a door may be unlocked with a swipe card, an RFID key fob, or through biometric means. A card access control system is one of the most common types of electronic door control, using a card with a magnetic stripe which can be swiped through a reader on the door. Hotels often use this system, which can be used to make temporary room keys. Laboratories and other facilities with areas requiring high security may also use a card control system, making the cards double as personnel identification.

source:http://www.wisegeek.com