tailieunhanh - Lecture Data security and encryption - Lecture 28: Firewalls
The contents of this chapter include all of the following: Firewalls; types of firewalls; packet-filter, stateful inspection, application proxy, circuit-level; Basing; bastion, host, personal; location and configurations; DMZ, VPN, distributed, topologies. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 28 Review have considered: various malicious programs trapdoor, logic bomb, trojan horse, zombie viruses worms distributed denial of service attacks Chapter 21 summary. Chapter 20 – Firewalls Opening quote. Introduction Information systems in corporations, government agencies, and other organizations have undergone a steady evolution from mainframes to LANs Internet connectivity is no longer optional, with information and services essential to the organization Moreover, individual users want and need Internet access Information systems in corporations,government agencies,and other organizations have undergone a steady evolution from mainframes to LANs. Internet connectivity is no longer optional, with information and services essential to the organization. Moreover, individual users want and need Internet access. However, while Internet access provides benefits, it enables the outside world to reach and interact with local network assets, creating a threat to the organization. While it is possible to equip each workstation and server on the premises network with strong security features, this is not a practical approach in general. Firewalls can be an effective means of protecting a local system or network of systems from network-based security threats while at the same time affording access to the outside world via wide area networks and the Internet. However they need to be part of a wider security strategy including host security. Introduction However, while Internet access provides benefits, it enables the outside world to reach And interact with local network assets, creating a threat to the organization While it is possible to equip each workstation and server on . | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 28 Review have considered: various malicious programs trapdoor, logic bomb, trojan horse, zombie viruses worms distributed denial of service attacks Chapter 21 summary. Chapter 20 – Firewalls Opening quote. Introduction Information systems in corporations, government agencies, and other organizations have undergone a steady evolution from mainframes to LANs Internet connectivity is no longer optional, with information and services essential to the organization Moreover, individual users want and need Internet access Information systems in corporations,government agencies,and other organizations have undergone a steady evolution from mainframes to LANs. Internet connectivity is no longer .
đang nạp các trang xem trước