answersLogoWhite

0


Best Answer

The challenge is in providing enough security to keep data safe, yet not too much so the people would be unable to work.

User Avatar

Wiki User

βˆ™ 13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the challenges of web application firewalls in order to protect the applications?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What hardware firewalls and antivirus is needed to protect 25 workstations running Windows?

You need the same hardware, firewalls, and antivirus software to protect one computer as you need to protect 25.


What are not benefits of firewalls?

Firewalls do not protect from viruses. Firewalls can help reduce the chances of being hacked, though an expert hacker might still find a way in. But it will be harder and take more time.


When configured correctly can network firewalls can help protect your network?

Yes, they can.


What the use of firewalls?

It is used to protect the PC from unwanted threats that are harmful for the PC.


Are firewalls a privacy risk?

Firewalls are to PROTECT your privacy. They keep other computers from contacting yours without your permission and sending viruses to it or accessing private information on your computer.


What were Abrahams challenges?

Abrahams challenges were that he had to protect his kids.


What types of computer crime do firewalls protect against?

can anyone tell me? What types of computer crime do firewalls protect against


You can protect your network against social engineers with locked doors passwords or firewalls True or False?

True


What are the legal uses of peer to peer networking?

This question confuses two completely different things. One is whether it is legal to use a particular application in a particular way. The other is whether an application is organized as peer-to-peer or some other way, such as client-server or master-slave. Whether an application is peer-to-peer has nothing to do with whether it is legal to use an application in a particular way. A peer-to-peer application is an networked application where none of the processes in the application is inherently controlled by any other process in the application. Contrast this with a client-server application, where a client makes requests of a server (which the server can honor or not as it sees fit), or a master-slave application, where a controlling process (the master) issues instructions to one or more controlled processes (the slaves). The most popular applications that we use on the Internet today tend to be client-server or master-slave applications, but applications do not inherently need to work this way. Consider for example a telephone or instant messaging program that allows users at two different computers to talk (via voice or text) to each other. Each computer can independently send messages (voice or text) to the other one. Many kinds of IM and telephony applications are set up as client-server (whether the server mediates between clients in some way) but one advantage of implementing these applications as peer-to-peer is that no central server is needed. Peer-to-peer applications have undeservedly developed a bad reputation for several reasons. One is that some popular peer-to-peer applications have been widely used to transfer copyrighted material. Yes, it's illegal (in most countries) to transfer copyrighted material without permission - but it doesn't matter whether this is done using a peer-to-peer program, or a client-server program, or a USB thumb drive. Copying of copyrighted material is illegal no matter how you do it. Another reason peer-to-peer apps have developed a bad reputation is that peer-to-peer applications don't care which end established a networking connection. Once the connection between two peers is established, either peer may make requests of the other. Many sites naively rely on "firewalls" to protect their computers from attack. A common policy is to block all connections that are being initiated from outside the firewall, on the theory that requests can only come from the party that initiated the network connection. Many client-server applications work this way, but this is not true for networked applications in general. Sites that naively rely on firewalls to protect their network may categorically object to usage of peer-to-peer programs since their firewalls will not protect them. Fortunately, the advantages of peer-to-peer applications are becoming more widely understood and acceptance of peer-to-peer as a legitimate organizing principle for networked applications is increasing. .


What are the major applications for gas absorption?

this process main application is to protect our environment by pollution by adsorbing the toxic gases,and even in the industry also it absorbs the harmful gases released by the chimineys.


What are the advantages of firewalls?

What_are_the_Advantages_of_firewallAdvantages of hardware firewalls over software firewall:· Speed: Normally, the hardware firewalls are tailored for faster response times, and hence handle more traffic loads.· Security: A firewall with its own operating system (proprietary) is less prone for attacks. This in turn reduces the security risk. In addition, hardware firewalls have enhanced security controls.· No Interference: A box, that is separated from other network components can be managed better, and does not load or slowdown other applications. The box can be moved, shutdown, or reconfigured with minimal interference to the network.http://networking.anandsoft.com/advantages-of-hardware-firewalls.html


What is cyber technology and its importance in education?

cybersecurity in Education is necessary to protect against financial loss and prevent disruption, it’s also crucial to protect students from harm. Which is why the sector needs to do everything it can to ensure their applications and systems are protected, and work to overcome any challenges.