16 - Lecture #16 SS G513 Network Security Chapter 20...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture #16 SS G513 Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable On War, Carl Von Clausewitz
Background image of page 2
Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent security concerns can’t easily secure every system in org need "harm minimisation" a Firewall usually part of this
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is a Firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions on network services only authorized traffic is allowed auditing and controlling access can implement alarms for abnormal behavior is itself immune to penetration provides perimeter defence
Background image of page 4
Firewall Limitations cannot protect from attacks bypassing it eg sneaker net, utility modems, trusted organisations, trusted services (eg SSL/SSH) cannot protect against internal threats eg disgruntled employee cannot protect against transfer of all virus infected programs or files because of huge range of O/S & file types
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Firewalls – Packet Filters
Background image of page 6
Firewalls – Packet Filters simplest of components foundation of any firewall system examine each IP packet (no context) and
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 25

16 - Lecture #16 SS G513 Network Security Chapter 20...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online