Please enable JavaScript.
Coggle requires JavaScript to display documents.
3.0 SECURITY DEVICES AND TECHNOLOGIES (END POINT PROTECTION & …
3.0 SECURITY DEVICES AND TECHNOLOGIES
END POINT PROTECTION &
MANAGEMENT
Operating
System
Patches
A patch is a piece of software designed to fix problems , or update a computer program or its supporting data.
Host-based
Intrusion Detection
System
monitor the data on the system
collect and analyze data,aggregatingit so
that it can be analyzed locally
Types of
HIDS architecture
Centralized host-based architecture
Distributed real-time host-based architecture
Device
Hardening
Disable unneeded services
Control device access
Access control list (ACL)
Lock down unused port
Personal
Firewall
Software : Norton Personal Firewall,McAfee
Hardware:Linksys,Cisco's PIX
Anti-virus Software
Protective software designed to defend
your computer against malicious software.
Malicious software: virus, trojan, keylogger, hijackers,
dialers and code that vandalizes your computer contents.
Used to prevent, detect, and remove malware.
Intrusion
Detection &
Prevention
Types of IDS
Host-based IDS
Distributed-based IDS
Protocols IDS
Network-based IDS
Design Scurity
Architecture
Plan,Design,Implement,
Operate,Optimize(PDIOO)
Security Architecture (SAFE)
Firewall
Technology
Packet Filtering
Network Address Translation (NAT )
Circuit-Level Gateways
Proxy - Application Proxies
Virtual Private Network (VPNs)
Architecture
Dual-Homed Host Architecture
Screened-Host Architecture
Screened-subnet Architecture
Function
Restrict incoming and outgoing traffic by
IP address,ports, or users
Block invalid packets
Meaning
Used to implement and enforce a security
policy for communication between networks
Separate local network from the internet
Appliance-
based
Firewall
PIX Security Appliance
Netscreen
SonicWall
Server-based Firewall
Microsoft ISA
CheckPoint
BorderManager
Packet Filtering
The basic method for protecting
the intranet border.
Works at the network layer of the OSI model.
Proxy
A application between
traffic and two network segment.
Replace the filter so it can block
the traffic from going through directly