Fire wall fundamentals
-
Written security policies exist to provide a high-level roadmap of what needs to be done to ensure that the organization has a well-defined and thought-out security strategy
11p chutieuchuathieulam 23-07-2010 96 9 Download
-
The ICF, now dubbed Windows Firewall, is a simple stateful firewall that is part of the Windows XP operating system. In essence
12p chutieuchuathieulam 23-07-2010 172 19 Download
-
Personal and desktop firewalls are frequently overlooked as security devices that should be implemented on a network.
2p chutieuchuathieulam 23-07-2010 75 5 Download
-
The closer you come to the resource that needs to be protected, the more intelligent and specific you can get in filtering traffic directed at that resource.
1p chutieuchuathieulam 23-07-2010 69 5 Download
-
One of my favorite quotes is from Sun Tzu's The Art of War: If you know the enemy and know yourself, you need not fear the result of a hundred battles.
8p chutieuchuathieulam 23-07-2010 55 5 Download
-
There is no shortage of motives behind the threats that attackers come up with. Perhaps the most dangerous motive is the conscious decision to break the law, typically in an effort to gain some financial or monetary gain.
2p chutieuchuathieulam 23-07-2010 84 7 Download
-
Virtual private networks (VPNs) are another feature that firewalls have quickly adopted. Firewalls, by the very nature of their placement in the network design, represent a natural device to provide termination for LAN-to-LAN and in some cases remote-access VPNs.
5p chutieuchuathieulam 23-07-2010 146 15 Download
-
Using Firewalls to Segment Internal Resources Perhaps the most overlooked implementation of a firewall is on the internal network.
4p chutieuchuathieulam 23-07-2010 73 6 Download
-
User Datagram Protocol (UDP) UDP is the polar opposite of TCP. Whereas TCP is connection oriented, reliable, and relatively complex, UDP is a connectionless, unreliable
3p chutieuchuathieulam 23-07-2010 175 53 Download
-
This through a simple example of troubleshooting a firewall configuration. Troubleshooting starts with the basic connectivity troubleshooting and escalates upward to more complex issues until the specific problem is identified
6p chutieuchuathieulam 23-07-2010 79 7 Download
-
One of many third-party antivirus/Internet security suites, Trend Micro's PC-cillin includes a personal firewall that you can use to protect the system
11p chutieuchuathieulam 23-07-2010 109 6 Download
-
Transmission Control Protocol (TCP) TCP is a connection-oriented transport mechanism that resides at Layer 4 of the OSI model.
5p chutieuchuathieulam 23-07-2010 132 11 Download
-
To paraphrase Shrek, the network perimeter is like an onion; it has lots of layers.
4p chutieuchuathieulam 23-07-2010 88 9 Download
-
There are two predominant firewall architectures, the single-firewall and dual-firewall architectures.
3p chutieuchuathieulam 23-07-2010 88 10 Download
-
No discussion of firewall and security tools is complete without a brief discussion regarding security-testing tools.
8p chutieuchuathieulam 23-07-2010 96 13 Download
-
Consequently, a firewall is only as effective as the firewall security policy (as opposed to the enterprise security policy) that dictates how the firewall will be used
3p chutieuchuathieulam 23-07-2010 95 10 Download
-
Act as an intermediary between hosts Cache data to reduce the time and external bandwidth required to service requests
2p chutieuchuathieulam 23-07-2010 110 11 Download
-
Protocols, Services, and Applications As mentioned, TCP/IP provides a mechanism to allow systems to communicate with each other across a network.
10p chutieuchuathieulam 23-07-2010 75 8 Download
-
As with configuring any firewall, administrators should develop a checklist that they can use during the installation and implementation of the PIX/ASA firewall in the network
2p chutieuchuathieulam 23-07-2010 79 11 Download
-
The PIX/ASA is a powerful stateful packet-inspection firewall with some basic application-inspection capabilities.
2p chutieuchuathieulam 23-07-2010 94 10 Download