lec25 - CprE 530 Lecture 25 Topics Network-Based Mitigation...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CprE 530 Lecture 25 Topics Network-Based Mitigation – Network Firewalls – Intrusion Detection and Prevention – Data Loss Prevention
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Firewalls Designed to “look” at each packet on the network and decide if the packet should be allowed to pass through the firewall or not. Uses set of rules to decide if the packet should be blocked Rules are typically based on the packet Public domain versions are available Firewall
Background image of page 2
Firewall Rules Stateless – Each packet is independent – Very fast and simple to implement – Only simple rules – Example: block all UDP but port 53 Stateful – Deals with packet streams – Slower and requires more resources – Can implement complex rules – Example: Block all port 53 unless there is a pending request. GUI on the device Network based – Typically password protected User control – Only allows access to control interface from inside network – Can use a separate control network
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Firewall types Transparent Router-based NAT-based Application Transparent Firewall
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 13

lec25 - CprE 530 Lecture 25 Topics Network-Based Mitigation...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online