4.3.4 Security devices
Some of the devices in the security architecture that can be used to control access, inspect content, and enforce policies include:
-
Firewalls – A firewall creates a barrier between two networks. The firewall analyses network traffic to determine if that traffic should be allowed to travel between the two networks based upon a set of rules that have been programmed into it, as shown in the following animation. (Click on the full screen button for a clearer view.)
-
Intrusion prevention systems (IPS) − The IPS monitors the activities on a network and determines if it is malicious. An IPS will attempt to prevent the attack by dropping traffic from the offending device or resetting a connection. Figure 22 shows more about how an IPS works.
OpenLearn - Internet of everything

Except for third party materials and otherwise, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence, full copyright detail can be found in the acknowledgements section. Please see full copyright statement for details.