TAILIEUCHUNG - Network Security Foundations phần 4

Bảo mật là gì? Lý do phổ biến nhất biện pháp an ninh không là gì? Tại sao các nhà cung cấp sẽ phát hành một sản phẩm ngay cả khi họ nghi ngờ rằng có thể có vấn đề bảo mật với phần mềm? Làm thế nào nhiều hệ điều hành chiếm 90% thị trường hệ điều hành? Bao thanh toán trong | Border Security 85 There s no reason to select a firewall just because it runs on the same operating system as the rest of your network. Most firewalls that run on operating systems are significantly less secure than device-based firewalls because they rely on the operating system to withstand denial of service attacks at the lower layers and because other insecure services may be running on the operating system. The majority of firewalls are configured by creating a specific policy called a rule base which typically lists pass fail rules for specific protocols and ports. Usually these rules are searched in top-down order and the final order in the rule base is a deny all rule. Once you ve selected a firewall configuration depends entirely upon the firewall you ve selected. You need to make yourself an expert on that specific firewall. This isn t particularly difficult anymore and there s little reason to worry about learning other firewalls once you ve selected one. Terms to Know Application-layer proxies proxy server border gateways source routing circuit layer switches stateful inspection content blocking stateless packet filters demilitarized zone transparent firewalls tunneling Network Address Translation virtual private networking packet filters virus scanning 86 Chapter 5 Review Questions 1. Firewalls are derived from what type of network component 2. What is the most important border security measure 3. Why is it important that every firewall on your network have the same security policy applied 4. What is a demilitarized zone 5. Why is it important to deny by default rather than simply block dangerous protocols 6. What fundamental firewall function was developed first 7. Why was Network Address Translation originally developed 8. Why can t hackers attack computers inside a network address translator directly 9. How do proxies block malformed TCP IP packet attacks Chapter 6 Virtual Private Networks In This Chapter The primary VPN mechanisms Characteristics

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.