Presentation is loading. Please wait.

Presentation is loading. Please wait.

PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.

Similar presentations


Presentation on theme: "PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM."— Presentation transcript:

1 PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM

2 EQUIPMENT REDUNDANCY  THIS IS THE USE OF MULTIPLE COPIES OF IT INFRASTRUCTURE  THE IT RESOURCES IN USE SHOULD BE LOCATED AT DIFFERENT PLACES  ALLOWS FOR DISASTER RECOVERY IN CASE THERE IS EQUIPMENT FAILURE/DAMAGE  ENSURES MAXIMUM UPTIME

3 ACCESS CONTROL LIST FILTERS  CONFIGURED AT A NUMBER OF DIFFERENT LOCATIONS  MAINLY USED ON FIREWALLS  SUPPORTED BY SOME ROUTERS AND SWITCHES  DEFINE THE NETWORK RESOURCES THAT ARE ACCESSIBLE TO A USER  PRINCIPLE OF LEAST PRIVILEGE SHOULD BE EMPLOYED

4 BORDER ROUTERS  THESE ARE ROUTERS LOCATED AT THE LOGICAL EDGES IN THE NETWORK DESIGN LAYOUT  THEY ACT AS THE INTERFACE OF THE NETWORK TO THE OUTSIDE WORLD  EXPOSED TO A LOT OF RISK, MUST BE PROTECTED

5 PROXY FILTERS  THESE ARE SERVERS THROUGH WHICH LAN USERS ACCESS THE INTERNET  CAN BE CONFIGURED WITH ACCESS LISTS  RESTRICT UNAUTHORIZED USERS FROM ACCESSING THE WEBSITE  ONLY THE PROXY SERVER IS DIRECTLY EXPOSED TO THE INTERNET, MINIMIZING THE AREA OF EXPOSURE

6 DEMILITARIZED ZONES  THESE ARE SECURE ZONES ESTABLISHED WITHIN A BIGGER NETWORK  ESTABLISHED BETWEEN THE INTERNET AND THE OUTWARD-FACING DEVICES E.G. SERVERS  ADDS AN ADDITIONAL LAYER OF SECURITY TO THE SYSTEM  REDUCES AREA OF EXPOSURE

7 REFERENCES Northcutt, S., Zeltser, L., Winters, S., Kent, K., & Ritchey, R. W. (2005). Inside Network Perimeter Security (Inside). Sams.


Download ppt "PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM."

Similar presentations


Ads by Google