The Overview of URL Filtering
HI Hi, Greetings!
Happy December 
Today, I would like to share with you an article about the overview of URL Filtering. Let's move to the article and I will explain part by part.
PART 03:
Important of URL Filtering:
People's primary technique of working, staying informed, and entertaining themselves is to surf web pages for information. In and of itself, the Internet is insecure. Network resources benefit us, but they can introduce new hazards. Among the threats are network security problems and service disruptions caused by network abuse:
At work, corporate employees visit non-job-related websites such as social networking and video websites, which reduces productivity, consumes network bandwidth, and even puts them in danger of breaking the law if they visit illegal websites.
When inappropriate websites are viewed at public institutions such as schools and libraries, laws are broken.
Employees' unintentional access to fraudulent and phishing websites may divulge confidential information about firms or individuals, as well as introduce malware and Trojan horses.
As a result, online behavior needs to be controlled. One method for tackling the concerns outlined above is URL filtering. This method restricts the URLs that users can access. You can ban access to phishing, social networking, and video sites by classifying websites. You can also choose which URLs will be blocked and which will be permitted.
Drawbacks of URL Filtering:
Over-blocking, which occurs when sites that users require access to are added to URL filters and blocked from use, is a typical problem that companies face with URL filtering. An employee could wish to use social media for new business and sales prospecting, but the site is prohibited to prevent employees from browsing for personal matters while at work.
By restricting employees from using the tools they need to work successfully, over-blocking reduces employee productivity and irritates employees. It can also add to the IT team's effort by increasing the number of requests for website access.

You are welcome to like and leave feedback in the comment area.
Link:
PART 01:
The Overview of URL Filtering - PART 01
PART 02:
The Overview of URL Filtering - PART 02
PART 04:
The Overview of URL Filtering - PART 04
PART 05:
The Overview of URL Filtering - PART 05Source:
https://info.support.huawei.com/info-finder/encyclopedia/en/URL+Filtering.html
https://www.toolbox.com/it-security/network-security/articles/what-is-url-filtering
M M Zaheer Hussain
Stay Safe!






