The present invention discloses methods for protecting a host system from
information-security risks posed by a URD, the method including the steps
of: operationally connecting the URD to the host system; communicating,
between the URD and the host system, via a network protocol, through a
firewall residing in the host system; and configuring said firewall to
provide security measures related to the URD. Preferably, the firewall is
a software firewall or a hardware firewall. A method for protecting a
host system from information-security risks posed by a URD, the method
including the steps of: operationally connecting the URD to the host
system; communicating, between the URD and the host system, via a network
protocol, through a firewall residing in the host system; and configuring
said firewall to restrict access of at least one application to the URD.
Preferably, the firewall is a software firewall or a hardware firewall.