Network attacks can broadly or specifically seek access to corrupt data on a
network. Networked hardware receives requests from operating systems and services
on a
network.
These filters detect and block the malicious attacks that target equipment
accessible through a network, such as printers, modems, routers and integrated phone
systems.