As the use of the internet is increasing, the big concern that arises in the minds of a user is database security. There are several methods of protection that have become available due to this growing demand to lower the risk of data being accessed by those not intended to have it. One method that can be used to solve this problem is the use of a firewall. Though the term may be identified by many, knowing and understanding this safety method can be helpful.
- Flagging: An essential part of database firewall is its ability to flag information. When a harmful intrusion or program is trying to gain access to your network, your firewall will flag it. When something is flagged, it is then noted to be an unwanted intrusion, and so it will not be allowed access to your network in any form. Some firewall software also adds the flagged material into a database so that it can be easily recognizable if any future instances occur.
- Control Traffic: The way that firewalls shield our computer depends on how they control the traffic in and out of our network. The common firewall program will use one or more of the following methods to control traffic:
- Packet filtering: Packets are small amounts of data that are then processed through a set of filters. If the filters allow the packets through, then they are sent to the system while all other packets are discarded.
- Proxy service: A proxy service simply gathers information from the Internet by way of the firewall and then it is sent to the users computer.
- Stateful inspection: This method is newer and instead of examining the contents of each packet it compares some details to a preexisting database of trusted information. If there is data in the packet that is recognized by the database of trusted information, then it is let through, if not, it is discarded.