Journal «Language & Science» UTMN.


№7 2018. 05.00.00 ТЕХНИЧЕСКИЕ НАУКИ


About the authors:

Stukun Kristina Sergeevna,

Undergraduate Student, the University of Tyumen,


The article is named “Firewalls”. The article is devoted to the one of the many potential topics in the field of IT security infrastructure. Application firewalls attempt to use application-specific knowledge to improve the security. This article provides an overview of firewall technologies. Providing a safe operating environment for a business-critical application is among the final—and arguably most crucial—steps in the assembly and integration process. The article contains information about firewall types such as Packet-Filtering Firewalls, Proxy Firewalls, Reverse-Proxy Firewalls. The author of the article provides information about Utilizing Packet Inspection, Packet-Inspection Flow Diagram, Reusing IP Addresses, NAT and PAT.


1. Firewalls [Electronic resource]. – Access mode: 
2. Application Firewalls and Proxies [Electronic resource]. Access mode: 
3. Types of Firewalls [Electronic resource]. Access mode: