Download presentation
Presentation is loading. Please wait.
Published byBridget Hopkins Modified over 9 years ago
1
IT security Are you protected against hackers?
2
Why are we in danger? The Internet is worldwide, publicly accessible More and more companies and institutes are connected to the Internet – they are the potential target New customers => new hackers
3
Why are we in danger? /2 Anyone can connect to the Internet (Internet Cafes, Hot spots, etc.) Downloadable hacker tools, articles New worms and viruses weekly
4
Probable attack types Attacks against web services Spyware, adware Spam DoS (Denial of Service) Attacks in the application layer Portscan etc.
5
Security rules The network must be divided into security zones Each zone has own security rules Between these zones there must be a device, which is usually the firewall
6
Firewall architectures There are typically three basic firewall architectures: Basic Border Basic with DMZ Network Dual Firewalls with DMZ Network
7
Demilitarized Zone (DMZ) Demilitarized Zone It is a firewall configuration for securing local area networks (LANs) In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.
8
Demilitarized Zone (DMZ) /2 One or more computers also run outside the firewall, in the DMZ Those computers on the outside intercept traffic and broker requests for the rest of the LAN, adding an extra layer of protection for computers behind the firewall.
9
Basic border firewall A single-layer solution Every firewall function on one device Simple Cheap The least secure solution
10
Basic firewall with DMZ Network We have server(s) providing services to the outside network The server is the most endangered We put it into a new network, which is the DMZ Better security and reliability
11
Dual firewall with DMZ Network Two firewalls: Outer Inner The network is divided into 3 segments: Outer network DMZ LAN Different architecture of the firewalls is practical – it’s more safe
12
What can you do? Use personal firewall It is a software running on the PC Protection for home networks Should be used on every computer Cheap or free solution Easy to configure and use It has limited capabilities
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.