What is the output output filtering?

Filter

Egress is a network security technique that involves preventing unauthorized operation to leave the network. This approach is usually paired with a number of other techniques to provide more complete network security, and for creating security layers that make it difficult to penetrate the system. Like other network security techniques, you can adapt to specific applications to meet the needs of a particular environment or organization; The aim is to ensure security without changing the safety system to the load for users. This type of filtering uses many people every day, even if they are not explicitly aware of it and are designed to protect people from the attacks that come from the outside. With filtering, harmful and sensitive material with output.S system security and prevents damage to systems that come into contact with the network.

Filter

Egress can capture viruses, attacks for rejection servicesAnd other harmful events from infected computers in the network. They can also control the release of information to make the system more safer, and to prevent information to prevent hackers that could be used to compromise the system. Filtering of outputs can also be used to reduce the type of information -release information; For example, people can be able to send e -mail, but not upload files to an external server.

This type of filtering is two -stage. The first phase includes passive monitoring on the network. The second phase involves determining what type of operation should be allowed. After creating a system, a number of exceptions are created to resolve a specific network operation without obstacles. Exceptions can also be set for temporary situations, in which case the person who needs the exception will apply to a programmer who processes the network security to introduce an exception.

with a good output filtering system can be a harmful and unauthorized material contained rather in a specific network, nEž to spread. This system can also be used to prevent unintentionally leakage of material, inappropriate release of material and unlawful network activities. For example, the university could use Empress filtering to limit file sharing to prevent distribution of illegally copied information and materials.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?