Transcript Chapter 15
Physical and Hardware Security
Chapter 15
Networking Essentials
Spring, 2013
Defining Firewalls
Firewalls are a combination of ___ & ___
What is a “black box?” (p. 502)
Default deny or default allow – which one?
Types of Firewalls
Network-based firewalls protect __ from __.
Host-based firewalls protect ____.
Access Control Lists
How they are processed
Lines are compared in sequential order
After a match is made, ACL is exited
Implicit deny at the end – why?
Standard ACLs vs Extended ACLs
Inbound vs outbound ACLs
Ways to make things more
secure
DMZ - Image on page 507
Protocol switching – shift to IPX – why?
Proxy Services
IP proxy
Web proxy
FTP proxy
SMTP proxy
More Firewall Stuff
Network Layer Firewalls
Stateful –
Stateless –
Application Layer Firewalls
Slower, because they …
Scanning Services
Default Scanning Settings:
Filtering for Content
Common things to filter:
Local Browser Settings
Zones
Trusted Sites
Customizing Settings
Intrusion Detection Systems
(IDS)
More of a watchdog than a firewall
Can be software or an actual device
Passive responses:
(honeypot) -
VPN Concentrators
Like a firewall, but made for VPNs
Allows for higher-speed throughput
Allows for encryption
Problems Affecting Device
Security
Physical security – where to keep stuff
Climate conditions –
Three barriers to your server –
Security zones
ID Badges
Logical Security Configurations
Logging On Locally
Only administrator can log onto server
Administrator must log on locally – why?
Access-Control Principles
Utilize implicit denies
(UNIX) - .allow file
(UNIX) - .deny file
Least-privilege model
Separate administrative duties
Rotate administrator jobs
Access Control Methods
Mandatory Access Control (MAC) Model
…
Discretionary Access Control (DAC)
…
Role-Based Access Control (RBAC)
…
Rule-Based Access Control (RBAC)
…
Unsecure Protocols
(UNIX) –
(UNIX) –
Secure Protocols