Đang chuẩn bị liên kết để tải về tài liệu:
Network Perimeter Security

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels. | J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Outline 7.1 General Framework 7.2 Packet Filters 7.3 Circuit Gateways 7.4 Application Gateways 7.5 Trusted Systems and Bastion Hosts 7.6 Firewall Configuration 7.7 Network Address Translations 7.8 Setting Up Firewalls J. Wang. Computer Network Security Theory and Practice. Springer 2008 LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels. Overview J. Wang. Computer Network . | J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Outline 7.1 General Framework 7.2 Packet Filters 7.3 Circuit Gateways 7.4 Application Gateways 7.5 Trusted Systems and Bastion Hosts 7.6 Firewall Configuration 7.7 Network Address Translations 7.8 Setting Up Firewalls J. Wang. Computer Network Security Theory and Practice. Springer 2008 LANs, WANs, WLANs are known as edge networks May be contained within businesses or homes Needs to be protected from the rest of the Internet! Why firewall? Encryption? Cannot stop malicious packets from getting into an edge network Authentication? Can determine whether an incoming IP packet comes from a trusted user However, not all host computers have resources to run authentication algorithms Host computers managed by different users with different skill levels. Overview J. Wang. Computer Network Security Theory and Practice. Springer 2008 General Framework J. Wang. Computer Network Security Theory and Practice. Springer 2008 What is a firewall? A hardware device, a software package, or a combination of both A barrier between the Internet and an edge network (internal network) A mechanism to filter Incoming (ingress) and outgoing (egress) packets. May be hardware and/or software Hardware is faster but can be difficult to update Software is slower but easier to update General Framework Firewall placement J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Outline 7.1 General Framework 7.2 Packet Filters 7.3 Circuit Gateways 7.4 Application Gateways 7.5 Trusted Systems and Bastion Hosts 7.6 Firewall Configuration 7.7 Network Address Translations 7.8 Setting Up Firewalls J. Wang. Computer Network Security Theory and Practice. Springer 2008 Packet Filters Perform ingress (incoming) and egress (outgoing) filtering on packets Only inspect IP .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.