Presentation is loading. Please wait.

Presentation is loading. Please wait.

Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.

Similar presentations


Presentation on theme: "Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013."— Presentation transcript:

1

2 Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013

3 Defining Firewalls Firewalls are a combination of ___ & ___ What is a “black box?” (p. 502) Default deny or default allow – which one?

4 Types of Firewalls Network-based firewalls protect __ from __. Host-based firewalls protect ____.

5 Access Control Lists How they are processed Lines are compared in sequential order After a match is made, ACL is exited Implicit deny at the end – why? Standard ACLs vs Extended ACLs Inbound vs outbound ACLs

6 Ways to make things more secure DMZ - Image on page 507 Protocol switching – shift to IPX – why? Proxy Services IP proxy Web proxy FTP proxy SMTP proxy

7 More Firewall Stuff Network Layer Firewalls Stateful – Stateless – Application Layer Firewalls Slower, because they …

8 Scanning Services Default Scanning Settings:

9 Filtering for Content Common things to filter:

10 Local Browser Settings Zones Trusted Sites Customizing Settings

11 Intrusion Detection Systems (IDS) More of a watchdog than a firewall Can be software or an actual device Passive responses: (honeypot) -

12 VPN Concentrators Like a firewall, but made for VPNs Allows for higher-speed throughput Allows for encryption

13 Problems Affecting Device Security Physical security – where to keep stuff Climate conditions – Three barriers to your server – Security zones ID Badges

14 Logical Security Configurations Logging On Locally Only administrator can log onto server Administrator must log on locally – why?

15 Access-Control Principles Utilize implicit denies (UNIX) -.allow file (UNIX) -.deny file Least-privilege model Separate administrative duties Rotate administrator jobs

16 Access Control Methods Mandatory Access Control (MAC) Model … Discretionary Access Control (DAC) … Role-Based Access Control (RBAC) … Rule-Based Access Control (RBAC) …

17 Unsecure Protocols (UNIX) –

18 Secure Protocols

19


Download ppt "Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013."

Similar presentations


Ads by Google