3.0 SECURITY DEVICES AND TECHNOLOGIES (END POINT PROTECTION & …
3.0 SECURITY DEVICES AND TECHNOLOGIES
END POINT PROTECTION &
A patch is a piece of software designed to fix problems , or update a computer program or its supporting data.
monitor the data on the system
collect and analyze data,aggregatingit so
that it can be analyzed locally
Centralized host-based architecture
Distributed real-time host-based architecture
Disable unneeded services
Control device access
Access control list (ACL)
Lock down unused port
Software : Norton Personal Firewall,McAfee
Protective software designed to defend
your computer against malicious software.
Malicious software: virus, trojan, keylogger, hijackers,
dialers and code that vandalizes your computer contents.
Used to prevent, detect, and remove malware.
Types of IDS
Security Architecture (SAFE)
Network Address Translation (NAT )
Proxy - Application Proxies
Virtual Private Network (VPNs)
Dual-Homed Host Architecture
Restrict incoming and outgoing traffic by
IP address,ports, or users
Block invalid packets
Used to implement and enforce a security
policy for communication between networks
Separate local network from the internet
PIX Security Appliance
The basic method for protecting
the intranet border.
Works at the network layer of the OSI model.
A application between
traffic and two network segment.
Replace the filter so it can block
the traffic from going through directly