A strategy called ''firewalls'' has been developed, whereby a second computer (a firewall) is placed between an organization's own computer and the Internet communication lines, to help control access and prevent "break-ins." It has been found that even a triple firewall architecture has been successfully penetrated by hackers.