answersLogoWhite

0


Best Answer

Simply put, the untrusted network (IE: the internet) is on the 'outside' of the Firewall, logically separating it from the trusted network, which you want to keep safe. In this way, you can think of the Firewall as the outer gates of your protected network.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the typical relationship among the untrusted network the firewall and the trusted network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is a firewall used for?

A firewall is usually placed in front of a group of machines and its primary function is to control communication from and to this group of machines. Communication between two machines over the Internet is a stream of packets (datagrams) send in both directions. The firewall examines all packets that is about to be routed through the machine and, based on a set of rules, determines if the packet is allowed to pass through the machine or not. This functionality is often referred as a packet filter. The secondary function of a firewall is to modify the packets passing through the firewall. This is called Network address translation (NAT), as the modifications usually applies to either sender or receiver information contained in the packets. NAT can for example be used to allow machines without a public addressable Internet protocol (IP) number, to access the Internet through a firewall, by using the IP-number of the firewall as the sender identification. This is also called ip masquerading, as it disguises the address of the machines behind the firewall. www.goldstardailynews.com


Where on the computer do you find out why you have this message Your computer is connected to a network that is not trusted?

If you have wireless, that is not secure.


What is a security utility program?

From the list you have mentioned, can you tell me the best security programs and how it performs for my laptop? A security utility program is a computer program that is designed to protect your computer against harmful things. Common activities of security programs are - Removing all sorts of baddies from your computer such as viruses, rootkits, spyware and trojans. - Offer a firewall to deny access from incoming connections from the internet. - Create backups, and restoring your system if something dangerous were happening to it. And, many others. There are numerous security programs such as: Avira Anti-Virus, AVG Anti-Virus, McCafee Anti-Virus, and Norton Anti-Virus. Other programs include Spybot: Search and Destroy, and Spyware Blaster.


What is ssl error?

SSL CONNECTION ERROR TYPES This connection is Untrusted Your connection is not private The sites security certificate is not trusted SSL Connection Error and SSL Protocol Error Server's certificate is not trusted The server's certificate security is not yet valid Your connection is not secure HOW TO FIX SSL CONNECTION ERROR? Check your date and time Exclude SSL protocol scanning in your antivirus settings Google chrome and Mozilla Firefox browser tweaks Export and import website's SSL certificate System restore your windows in previous date before the SSL connection error occur


Swiftkit a keylogger?

No it's not. As long as you get it from a trusted source, it's clean.

Related questions

What are firewalls?

Firewall act as a security gateway between two networks as trusted and untrusted networks. (VIKRAM SINGH)


Which abbreviation refers to an area of the network that is accessible by both internal or trusted as well as external or untrusted host devices?

DMZ


Which is a firewall?

Firewall define by its name only firewall means the wall of fire. firewall act as a security gateway between two network(usually between trusted and untrusted network) . Basically firewalls depends on the manufacturer. Ike so many are their for example CISCO,JUNIPHER,CHECKPOINT and etc but in the current senario checkpoint firewalls are mostly in use because they are not so costly and also realiable. firewall also have three generations first is packet filter, second is application proxy and third and last is stateful inspection. these are the generation according to checkpoint and stateful inspection firewall invented by checkpoint byself. ( VIKRAM SINGH )


What is a function performed by an intermediary permits only known trusted data to access the network?

firewall


Which intermediary devices could be used to implement security between networks?

Security between networks is implemented in an intermediary device (a router or firewall appliance) at the perimeter of the network. The firewall function performed by this device permits only known, trusted data to access the network.


What is is a firewall?

A firewall is something that protects your computer from viruses--a barrier between your computer and where the viruses come from. A firewall can be hardware, software or a combination. A firewall is generally a network security device or software that actively monitors incoming and outgoing network traffic. It can either allow or block certain traffic based on a defined set of internet security protocols. A firewall acts as a barrier that limits the damages from internal and external cyber attacks. The firewall can be broadly divided into host-based and network-based. A host-based firewall is normally installed on individual servers and monitors incoming and outgoing network signals. A network-based firewall is established in the cloud's infrastructure or it can be a virtual firewall service.


How do you verify an untrusted enterprise developer?

I've already trusted the enterprise developer. I was able to use the app and it worked perfectly fine. Then I decided to use it today and the untrusted pop up showed up. So i looked in settings, went to general, device management. It shows that it's trusted but it isn't verified. Does anyone know how to fix this problem?


Answers for oct 8 2008?

Network protection is evaluated with a security scanners-a program that simulated network attacks and generates a report about which attacks may succeed KESS detects this scanning as a real attack and blocks all network packets from the scanning computer. How can an exclusion be configured for KES8 not to block packets from the scanning computer? options 1: add the security scanner program to the list of trusted processes in the kes8 policy 2: add the security scanner program to the trusted category in the firewall policy of KES8 3: add the address of the scanning computer to the list of networks in the firewall section of KES8 policy and specify the trusted network status for it 4: add the address of the scanning computer to the list of exclusions in the network attack blocker policy


What is a firewall used for?

A firewall is usually placed in front of a group of machines and its primary function is to control communication from and to this group of machines. Communication between two machines over the Internet is a stream of packets (datagrams) send in both directions. The firewall examines all packets that is about to be routed through the machine and, based on a set of rules, determines if the packet is allowed to pass through the machine or not. This functionality is often referred as a packet filter. The secondary function of a firewall is to modify the packets passing through the firewall. This is called Network address translation (NAT), as the modifications usually applies to either sender or receiver information contained in the packets. NAT can for example be used to allow machines without a public addressable Internet protocol (IP) number, to access the Internet through a firewall, by using the IP-number of the firewall as the sender identification. This is also called ip masquerading, as it disguises the address of the machines behind the firewall. www.goldstardailynews.com


What is antispoofing?

Using spoofing, an intruder can fake the source address of his packets and make them look like they originated on the trusted hosts.The basic idea of anti-spoofing protection is to create a firewall rule assigned to the external interface of the firewall that examines source address of all packets crossing that interface coming from outside. If the address belongs to the internal network or the firewall itself, the packet is dropped.


The trusted application feature in HIPS?

Marking an application as trusted, it helps to eliminate creating exceptions for host IPS, firewall and application blocking rules


What is the prefix of trust?

The prefixes of trust are-antitrust, distrust, entrust, mistrust, ,