Chapter 6

Chapter 6 - Learning Objectives Upon completion of this...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd Edition 2 Learning Objectives Upon completion of this material, you should be able to: Explain the role of physical design in the implementation of a comprehensive security program Describe firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up access protection—that is, how these connection methods can be controlled to assure confidentiality of information, and the authentication and authorization of users Explain content filtering technology Describe the technology that enables the use of virtual private networks
Background image of page 2
Principles of Information Security, 3rd Edition 3 Introduction Technical controls essential in enforcing policy for many IT functions that do not involve direct human control Technical control solutions improve organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd Edition 4 Physical Design The physical design process: Selects technologies to support information security blueprint Identifies complete technical solutions based on these technologies, including deployment, operations, and maintenance elements, to improve security of environment Designs physical security measures to support technical solution Prepares project plans for implementation phase that follows
Background image of page 4
Principles of Information Security, 3rd Edition 5 Firewalls Prevent specific types of information from moving between the outside world (untrusted network) and the inside world (trusted network) May be separate computer system; a software service running on existing router or server; or a separate network containing supporting devices
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd Edition 6 Processing Modes of Firewalls Five processing modes that firewalls can be categorized by are: Packet filtering Application gateways Circuit gateways MAC layer firewalls Hybrids
Background image of page 6
Principles of Information Security, 3rd Edition 7 Packet Filtering Packet filtering firewalls examine header information of data packets Most often based on combination of: Internet Protocol (IP) source and destination address Direction (inbound or outbound) Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests Simple firewall models enforce rules designed to prohibit packets with certain addresses or partial addresses
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd Edition 8 Packet Filtering (continued) Three subsets of packet filtering firewalls: Static filtering: requires that filtering rules governing how the firewall decides which packets are allowed and which are denied are developed and installed Dynamic filtering: allows firewall to react to emergent event and update or create rules to deal with event Stateful inspection: firewalls that keep track of each network connection between internal and external systems using a state table
Background image of page 8
Principles of Information Security, 3rd Edition 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd Edition 10
Background image of page 10
Principles of Information Security, 3rd Edition 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd Edition 12
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 62

Chapter 6 - Learning Objectives Upon completion of this...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online