firewall, type of system used to monitor connections between computer networks. One of the earliest responses to malicious activity perpetrated through the Internet, firewalls became a standard part of corporate, governmental, and personal networks.

At its most basic, a firewall either permits or blocks a requested network connection—such as a website, an e-mail, or a file transfer—based on a set of policies determined by a network administrator or personal user. It is used to protect internal networks and private or sensitive data. A firewall also logs information about network traffic, which can help an administrator understand and prevent attacks.

Typically, a firewall allows no direct connection between the internal network and the Internet. Instead, external connection requests, or digital packets, may be routed to a heavily secured “bastion host” server designed to withstand attack or to a larger “demilitarized zone,” a controlled network between the internal network and the outside. The firewall then evaluates the packet based on programmed security policies and decides whether to permit or deny access. A firewall can regulate access going either to or from the internal network; for instance, some companies use a firewall to block employee access to certain public websites.

The first firewalls were developed in the 1980s at the American technology companies Cisco Systems and Digital Equipment Corporation. These “network layer” firewalls judged packets based on simple information such as their apparent source, destination, and connection type. Although fast and transparent, these systems were fairly easily foiled. In the early 1990s a new generation of “application layer” firewalls emerged; though more cumbersome to set up and operate, they performed a more thorough inspection. In the early 21st century, most firewalls were hybrids of these two primary types.

The Editors of Encyclopaedia BritannicaThis article was most recently revised and updated by Erik Gregersen.

computer security

Also known as: cyber security, cybersecurity
Also called:
cybersecurity
Top Questions

What is computer security?

Does artificial intelligence (AI) compromise computer secutiry?

computer security, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device or medium that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key. (See data encryption.)

Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. The proliferation of personal computers in the 1980s compounded the problem because they enabled hackers (irresponsible computerphiles) to illegally access major computer systems from the privacy of their homes. With the tremendous growth of the Internet in the late 20th and early 21st centuries, computer security became a widespread concern. The development of advanced security techniques aims to diminish such threats, though concurrent refinements in the methods of computer crime pose ongoing hazards.

The Editors of Encyclopaedia BritannicaThis article was most recently revised and updated by Encyclopaedia Britannica.