+ All Categories
Home > Documents > Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Date post: 18-Jan-2016
Category:
Upload: lorena-reed
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
14
Network Security: Network Security: Firewalls Firewalls MIS 5973 – MIS 5973 – Infrastructures Infrastructures Summer 2002 – Kelly S. Summer 2002 – Kelly S. Nix Nix
Transcript
Page 1: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Network Security: Network Security: FirewallsFirewalls

MIS 5973 – InfrastructuresMIS 5973 – Infrastructures

Summer 2002 – Kelly S. NixSummer 2002 – Kelly S. Nix

Page 2: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

The only safe computer is a dead The only safe computer is a dead computer...computer...

Page 3: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

The Threats

Denial-of-ServiceUnauthorized AccessExecution of Unauthorized CommandsBreaches of ConfidentialityDestructive Behavior

Page 4: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Who Are These Guys?

activists club initiates competitors consultants crackers for hire crackers customers cyber-gangs deranged people drug cartels economic rivals extortionists foreign agents and spies

Fraudsters global coalitions government agencies hackers hoodlums Industrial espionage

experts information warriors infrastructure warriors insiders maintenance people military organizations nation states nature

organized crime paramilitary

groups police private

investigators professional

thieves reporters terrorists tiger teams vandals vendors whistle blowers

Page 5: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.
Page 6: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Basic Security

Backup, Backup, BackupControl Where Data Is LocatedDecentralize Your Security SystemYour Operating System May Not Be Your Friend

Page 7: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.
Page 8: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Firewalls: Locking Out The World

Page 9: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Firewall Terminology

Bastion HostRouterAccess Control List (ACL)Demilitarized Zone (DMZ)ProxyStateful InspectionNetwork Address Translation (NAT)

Page 10: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Hardware Firewall

Page 11: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Software Firewall

Page 12: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

How It Works

Page 13: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Firewalls & the OSI

Page 14: Network Security: Firewalls MIS 5973 – Infrastructures Summer 2002 – Kelly S. Nix.

Recommended