Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

FIREWALLs

Descripción

hehe
nurdiyanazr
Mapa Mental por nurdiyanazr, actualizado hace más de 1 año
nurdiyanazr
Creado por nurdiyanazr hace alrededor de 9 años
175
0
1 2 3 4 5 (0)

Resumen del Recurso

FIREWALLs
  1. Defination
    1. Firewalls is a device that filter all trafic between a protected ('inside') network and a less trustworthy ('outside) network.
    2. Type
      1. Packet filtering gateaway

        Nota:

        • - control access to packet based on packet address (source/destination), specific transport protocol - just see nametag but not ID (only IP but nit packet content) -  cannot choose between allowable TELNET and non-allowable ones - can block packets from ‘outside’ trying to disguise to be one from ‘inside’-> trying to forge an IP address
        1. Stateful inspection firewalls

          Nota:

          • - Maintain state information between packet in an input stream - Can be used to thwart attack that are split across 2 or more packet
          1. Application proxies

            Nota:

            • - a.k.a bastion host - it check the content of a packet and only allows action that are in the given guidelines - caching popular sites for easy retrieval - proxies can be tailored to specific requirements, like logging details of access
            1. Guards

              Nota:

              • -add functionality to a proxy firewall until it starts to look like a guard - receives protocol data, interprets them and passes through - Sort of a twin of proxy firewall
              1. Personal firewalls

                Nota:

                • -an application program that runs on a workstation to block unwanted traffic - The user decides who to trust and who not to
              2. Level
                1. Application

                  Nota:

                  • - More advanced - Can make decisions based on the actual content of the packet (not just header) - Can contain extra authentication and do more logging - Acts as a proxy: must "understand" the application protocols used. Needs a proxy server for each application type such as HTTP, FTP, Telnet, etc.
                  1. Network

                    Nota:

                    • - often in hardware - make decision based on the source, destination address and ports in individual packets - a specially configured router -very fast -transparent to user
                  Mostrar resumen completo Ocultar resumen completo

                  0 comentarios

                  There are no comments, be the first and leave one below:

                  Similar

                  CEH: IDS, Firewalls and Honeypots Test 2
                  amandarackham
                  Comunidades Autónomas de España y sus Capitales
                  maya velasquez
                  Práctica de Biología para la Prepa 1
                  Raúl Fox
                  Ortografía
                  Lenah Sanz
                  Resumen de Competencias Comunicativas del Español: Estructura de la Lengua
                  Raúl Fox
                  Diseño organizacional e Integración del personal
                  David Pacheco Ji
                  Matrices y Determinantes
                  Diego Santos
                  LEY DE CONTRATOS
                  Sero Tonina
                  El Renacimiento y la literatura renacentista en España
                  Manu prieto
                  CONCEPTOS EBAU 2019. Fichas
                  Guadalupe Rodriguez Iglesias